Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/keshiba/cve-2019-16278
Exploit for the CVE-2019-16278 vulnerability
https://github.com/keshiba/cve-2019-16278
exploits httpd
Last synced: about 1 month ago
JSON representation
Exploit for the CVE-2019-16278 vulnerability
- Host: GitHub
- URL: https://github.com/keshiba/cve-2019-16278
- Owner: keshiba
- Created: 2020-03-30T08:54:06.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2022-06-24T16:41:07.000Z (over 2 years ago)
- Last Synced: 2024-04-20T08:52:17.063Z (8 months ago)
- Topics: exploits, httpd
- Language: Rust
- Homepage:
- Size: 5.86 KB
- Stars: 0
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2019-16278
![Rust](https://github.com/keshiba/cve-2019-16278/workflows/Rust/badge.svg)
This is an exploit for the CVE-2019-16278 vulnerability.
It allows remote code execution on an **nhttpd** server *v1.9.6*.
## Building from Source
This tool is written in Rust and you need to install the Rust compiler which is super easy if you follow the instructions in their [page](https://www.rust-lang.org/tools/install)### Compiling
Once you have the compiler and `cargo` installed, you can run:
```bash
cargo build
```## Example
```bash
./cve-2019-16278 10.10.1.1 80 "cat /etc/passwd"
```
This example connects to the host 10.10.1.1 on port 80 and executes the `cat /etc/passwd` on the remote host.