Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-7609 PoC — Elasticsearch Kibana 代码注入漏洞

Source
Associated Vulnerability
Title:Elasticsearch Kibana 代码注入漏洞 (CVE-2019-7609)
Description:Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Readme
# CVE-2019-7609-KibanaRCE
Minor changes were made to the CVE to make it compatible with Python 3. cve-modific.py

Here are the modifications: In the get_kibana_version() function, the line match = re.findall(pattern, r.content) was updated to match = re.findall(pattern, r.text). This change was made to use r.text instead of r.content, allowing the response to be treated as a string rather than bytes.

![Captura de tela de 2023-07-16 21-35-30](https://github.com/OliveiraaX/CVE-2019-7609-KibanaRCE/assets/131061822/59de3ace-e334-46ac-8501-c7b9d12d7882)

![Captura de tela de 2023-07-16 21-50-42](https://github.com/OliveiraaX/CVE-2019-7609-KibanaRCE/assets/131061822/f33a1461-6d17-4877-bdf7-9733e60086bd)
For educational purposes This script is intended for educational use only.

Original: https://github.com/LandGrey/CVE-2019-7609/
File Snapshot

[4.0K] /data/pocs/547ff89e1a5e88d94d90a8b3d80847323cd80165 ├── [4.9K] cve-modific.py └── [ 837] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →