Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-19609

Description

The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.

POC

Reference

- http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html

- https://github.com/strapi/strapi/pull/4636

Github

- https://github.com/0xaniketB/HackTheBox-Horizontall

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Anogota/Horizontall

- https://github.com/D3m0nicw0lf/CVE-2019-19609

- https://github.com/Hackhoven/Strapi-RCE

- https://github.com/JMontRod/Pruebecita

- https://github.com/RamPanic/CVE-2019-19609-EXPLOIT

- https://github.com/Ruviixx/proyecto-ps

- https://github.com/Trivialcorgi/Proyecto-Prueba-PPS

- https://github.com/abelsrzz/CVE-2019-18818_CVE-2019-19609

- https://github.com/daltonmeridio/WriteUpHorizontall

- https://github.com/diego-tella/CVE-2019-19609-EXPLOIT

- https://github.com/ebadfd/CVE-2019-19609

- https://github.com/glowbase/CVE-2019-19609

- https://github.com/guglia001/CVE-2019-19609

- https://github.com/n0-traces/cve_monitor

- https://github.com/n000xy/CVE-2019-19609-POC-Python

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/z9fr/CVE-2019-19609