Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-13024 PoC — Centreon 命令注入漏洞

Source
Associated Vulnerability
Title:Centreon 命令注入漏洞 (CVE-2019-13024)
Description:Centreon 18.x before 18.10.6, 19.x before 19.04.3, and Centreon web before 2.8.29 allows the attacker to execute arbitrary system commands by using the value "init_script"-"Monitoring Engine Binary" in main.get.php to insert a arbitrary command into the database, and execute it by calling the vulnerable page www/include/configuration/configGenerate/xml/generateFiles.php (which passes the inserted value to the database to shell_exec without sanitizing it, allowing one to execute system arbitrary commands).
Description
The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024
Readme
# CVE-2019-13024
The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024
File Snapshot

[4.0K] /data/pocs/685bfd3e7e10eddff2d9dedd7bc9448d0e721974 ├── [3.2K] Centreon-exploit.py └── [ 100] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →