Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13 | https://github.com/mpgn/CVE-2018-17246 | POC Details |
| 2 | Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute JavaScript which could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-17246.yaml | POC Details |
| 3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Kibana%20%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E%20CVE-2018-17246.md | POC Details |
| 4 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/kibana-cve-2018-17246.yml | POC Details |
| 5 | https://github.com/vulhub/vulhub/blob/master/kibana/CVE-2018-17246/README.md | POC Details | |
| 6 | A script to download specific Vulhub repository folder (kibana/CVE-2018-17246) from GitHub. | https://github.com/Almandev/Sub-folderFetcher | POC Details |
No public POC found.
Login to generate AI POC| CVE-2018-17244 | Elasticsearch Security 安全漏洞 | |
| CVE-2018-17245 | Elasticsearch Kibana 安全漏洞 | |
| CVE-2018-17247 | Elasticsearch Security 跨站脚本漏洞 |
No comments yet