cve/2019/CVE-2019-6447.md

64 lines
3.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-6447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6447)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
### POC
#### Reference
- http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html
2024-05-26 14:27:05 +02:00
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
2024-06-09 00:33:16 +00:00
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xT11/CVE-POC
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsyr0/OSCP
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Chethine/EsFileExplorer-CVE-2019-6447
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/H3xL00m/CVE-2019-6447
- https://github.com/KasunPriyashan/CVE-2019_6447-ES-File-Explorer-Exploitation
- https://github.com/KaviDk/CVE-2019-6447-in-Mobile-Application
- https://github.com/Kayky-cmd/CVE-2019-6447--.
- https://github.com/Ly0nt4r/OSCP
- https://github.com/N3H4L/CVE-2019-6447
- https://github.com/Nehal-Zaman/CVE-2019-6447
- https://github.com/Osuni-99/CVE-2019-6447
- https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447
- https://github.com/SirElmard/ethical_hacking
- https://github.com/VinuKalana/CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer
- https://github.com/amjadkhan345/esfile
- https://github.com/angristan/awesome-stars
- https://github.com/c0d3cr4f73r/CVE-2019-6447
- https://github.com/codeonlinux/esexplorervuln
- https://github.com/crypticdante/CVE-2019-6447
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447
- https://github.com/k4u5h41/CVE-2019-6447
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/mooyoul/awesome-stars
- https://github.com/n3ov4n1sh/CVE-2019-6447
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oscpname/OSCP_cheat
- https://github.com/revanmalang/OSCP
- https://github.com/svg153/awesome-stars
- https://github.com/txuswashere/OSCP
- https://github.com/vino-theva/CVE-2019-6447
- https://github.com/volysandro/cve_2019-6447
- https://github.com/x00tex/hackTheBox
- https://github.com/xhref/OSCP