10
CVSSv2

CVE-2019-5029

Published: 13/11/2019 Updated: 07/06/2022
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exhibitor project exhibitor

Github Repositories

Exihibitor Web Ui 1.7.1 RCE, CVE-2019-5029

Exhibitor-RCE Exhibitor Web Ui 171 RCE, CVE-2019-5029 Step 1: $ git clone githubcom/thehunt1s0n/Exihibitor-RCE/ Step 2: $ cd Exihibitor-RCE/ Step 3 (optional): You might need to edit json data payload in the script To do that simply capture the request using burpsuite when comiting the changes in the config tab of exihibitor and copy pasting into the curl command in