mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
33 lines
1.5 KiB
Markdown
33 lines
1.5 KiB
Markdown
![]() |
### [CVE-2019-19609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19609)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html
|
||
|
- http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html
|
||
|
- https://github.com/strapi/strapi/pull/4636
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xaniketB/HackTheBox-Horizontall
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Anogota/Horizontall
|
||
|
- https://github.com/D3m0nicw0lf/CVE-2019-19609
|
||
|
- https://github.com/JMontRod/Pruebecita
|
||
|
- https://github.com/RamPanic/CVE-2019-19609-EXPLOIT
|
||
|
- https://github.com/Ruviixx/proyecto-ps
|
||
|
- https://github.com/Trivialcorgi/Proyecto-Prueba-PPS
|
||
|
- https://github.com/daltonmeridio/WriteUpHorizontall
|
||
|
- https://github.com/diego-tella/CVE-2019-19609-EXPLOIT
|
||
|
- https://github.com/glowbase/CVE-2019-19609
|
||
|
- https://github.com/guglia001/CVE-2019-19609
|
||
|
- https://github.com/n000xy/CVE-2019-19609-POC-Python
|
||
|
- https://github.com/z9fr/CVE-2019-19609
|
||
|
|