https://github.com/landgrey/cve-2019-7609
exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts
https://github.com/landgrey/cve-2019-7609
kibana python rce
Last synced: 3 months ago
JSON representation
exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts
- Host: GitHub
- URL: https://github.com/landgrey/cve-2019-7609
- Owner: LandGrey
- License: mit
- Created: 2019-10-21T15:31:13.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2023-08-29T17:49:28.000Z (about 2 years ago)
- Last Synced: 2025-04-30T21:40:47.309Z (6 months ago)
- Topics: kibana, python, rce
- Language: Python
- Size: 32.2 KB
- Stars: 163
- Watchers: 7
- Forks: 64
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# CVE-2019-7609
exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts**snapshot**

**usage**
```python
# python2 CVE-2019-7609-kibana-rce.py -husage: CVE-2019-7609-kibana-rce.py [-h] [-u URL] [-host REMOTE_HOST]
[-port REMOTE_PORT] [--shell]optional arguments:
-h, --help show this help message and exit
-u URL such as: http://127.0.0.1:5601
-host REMOTE_HOST reverse shell remote host: such as: 1.1.1.1
-port REMOTE_PORT reverse shell remote port: such as: 8888
--shell reverse shell after verify```