https://github.com/keshiba/cve-2019-16278
Exploit for the CVE-2019-16278 vulnerability
https://github.com/keshiba/cve-2019-16278
exploits httpd
Last synced: 3 months ago
JSON representation
Exploit for the CVE-2019-16278 vulnerability
- Host: GitHub
- URL: https://github.com/keshiba/cve-2019-16278
- Owner: keshiba
- Created: 2020-03-30T08:54:06.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2022-06-24T16:41:07.000Z (almost 3 years ago)
- Last Synced: 2025-01-09T07:44:24.058Z (5 months ago)
- Topics: exploits, httpd
- Language: Rust
- Homepage:
- Size: 5.86 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2019-16278

This is an exploit for the CVE-2019-16278 vulnerability.
It allows remote code execution on an **nhttpd** server *v1.9.6*.
## Building from Source
This tool is written in Rust and you need to install the Rust compiler which is super easy if you follow the instructions in their [page](https://www.rust-lang.org/tools/install)### Compiling
Once you have the compiler and `cargo` installed, you can run:
```bash
cargo build
```## Example
```bash
./cve-2019-16278 10.10.1.1 80 "cat /etc/passwd"
```
This example connects to the host 10.10.1.1 on port 80 and executes the `cat /etc/passwd` on the remote host.