Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15813 PoC — Sentrifugo 代码问题漏洞

Source
Associated Vulnerability
Title:Sentrifugo 代码问题漏洞 (CVE-2019-15813)
Description:Multiple file upload restriction bypass vulnerabilities in Sentrifugo 3.2 could allow authenticated users to execute arbitrary code via a webshell.
Description
This container was made to explain and demonstrate how CVE-2019-15813 (Sentrifugo works)
Readme
# CVE-2019-15813
This container was made to explain and demonstrate how CVE-2019-15813 (Sentrifugo works)

# Sentrifugo V3.2
Sentrifugo is a Human Resource Management System

# How to Install
docker-compose up


# Default crentials to test
----Super Admin----
Username : empp0001
Password : 5faa7bdf3d7af

---Employee----
Username: EMPP123
Password: bygedupub

--Reverse PHP shell--
Extract resume.zip (Archived because windows defender may delete it)
Edit the IP and Port


File Snapshot

[4.0K] /data/pocs/c024f278b7d712daffc327ec9e36154876505463 ├── [ 24M] CVE2019.part01.rar ├── [ 24M] CVE2019.part02.rar ├── [ 24M] CVE2019.part04.rar ├── [ 24M] CVE2019.part05.rar ├── [ 24M] CVE2019.part06.rar ├── [ 24M] CVE2019.part07.rar ├── [ 17M] CVE2019.part08.rar ├── [ 24M] CVE2019R.part03.rar ├── [ 475] README.md └── [725K] report.pdf 0 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →