CVE-2017-11610
HIGH EXPLOITED IN THE WILD NUCLEISupervisor XML-RPC Authenticated Remote Code Execution
Title source: metasploitDescription
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/42779
github
175 stars
by wjl110 · javascriptpoc
https://github.com/wjl110/CVE-Master/tree/main/CVE-2017-11610-main
nomisec
WORKING POC
by ivanitlearning · remote-auth
https://github.com/ivanitlearning/CVE-2017-11610
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/supervisor_xmlrpc_exec.rb
Nuclei Templates (1)
XML-RPC Server - Remote Code Execution
HIGHby notnotnotveg
Shodan:
http.title:"Supervisor Status" || http.title:"supervisor status"
FOFA:
title="supervisor status"
References (12)
Scores
CVSS v3
8.8
EPSS
0.9383
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-04-08
InTheWild.io
2021-04-08
CWE
CWE-276
Status
published
Products (19)
debian/debian_linux
8.0
debian/debian_linux
9.0
fedoraproject/fedora
24
fedoraproject/fedora
25
fedoraproject/fedora
26
pypi/supervisor
0 - 3.0.1PyPI
redhat/cloudforms
4.5
supervisord/supervisor
3.1.0
supervisord/supervisor
3.1.1
supervisord/supervisor
3.1.2
... and 9 more
Published
Aug 23, 2017
Tracked Since
Feb 18, 2026