### [CVE-2017-11610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11610) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups. ### POC #### Reference - https://www.exploit-db.com/exploits/42779/ #### Github - https://github.com/7hang/cyber-security-interview - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/CLincat/vulcat - https://github.com/NCSU-DANCE-Research-Group/CDL - https://github.com/SexyBeast233/SecBooks - https://github.com/TesterCC/exp_poc_library - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/amcai/myscan - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/cyberharsh/supervisord11610 - https://github.com/everping/whitehat-grand-prix-2017 - https://github.com/hanc00l/some_pocsuite - https://github.com/ivanitlearning/CVE-2017-11610 - https://github.com/jiangsir404/POC-S - https://github.com/lnick2023/nicenice - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/savior-only/javafx_tools - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/yaunsky/CVE-2017-11610