Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-12185 PoC — Elabftw 命令代码问题漏洞

Source
Associated Vulnerability
Title:Elabftw 命令代码问题漏洞 (CVE-2019-12185)
Description:eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
Description
eLabFTW 1.8.5 'EntityController' Arbitrary File Upload / RCE (CVE-2019-12185)
Readme
- Exploit Title         : eLabFTW 1.8.5 'EntityController' Arbitrary File Upload / RCE
- Date                  : 5/18/19
- Exploit Author        : liquidsky (Joseph McPeters)
- Vulnerable Software   : eLabFTW 1.8.5
- Vendor Homepage       : https://www.elabftw.net/
- Version               : 1.8.5
- Software Link         : https://doc.elabftw.net/
- Tested On             : Linux / PHP Version 7.0.33 / Default installation (Softaculous)
- Author Site		: http://incidentsecurity.com | https://github.com/fuzzlove
- CVE                   : CVE-2019-12185 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12185

- Greetz : wetw0rk, offsec ^^

- Description: eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component.
  This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request.
  This will allow for PHP files to be written to the web root, and for code to execute on the remote server. 
 
- Notes: Once this is done a php shell will drop at https://[target site]/[elabftw directory]/uploads/[random 2 alphanum]/[random long alphanumeric].php5?e=whoami
  You will have to visit the uploads directory on the site to see what the name is. However there is no protection against directory listing.
  So this can be done by an attacker remotely.
File Snapshot

[4.0K] /data/pocs/fdad83873f3bd969143948fd44d9a4131414d27f ├── [6.8K] elabftw-185.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →