Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-5029 PoC — Exhibitor 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Exhibitor 操作系统命令注入漏洞 (CVE-2019-5029)
Description:An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
Description
This is a Python script PoC for CVE-2019-5029
Readme
# CVE-2019-5029
This is a Python script PoC for CVE-2019-5029. It is a RCE for Exhibitor Web UI 1.7.1.

## How to use

Clone this repo
``
git clone https://github.com/yZ1337/CVE-2019-5029.git
``

Execute as follows
``
python3 CVE-2019-5029.py <TARGET_IP> <TARGET_PORT> <ATTACKER_IP> <ATTACKER_PORT>
``

Make sure the request inside the script is the same as the request of the Config.
File Snapshot

[4.0K] /data/pocs/9f54f7d3d495d330fa128eda3c060e036f066dc2 ├── [2.2K] CVE-2019-5029 ├── [ 11K] LICENSE └── [ 385] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →