Std42 Elfinder < 2.1.48 - OS Command Injection
Title source: ruleDescription
elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/46539
exploitdb
WORKING POC
VERIFIED
by q3rv0 · pythonwebappsphp
https://www.exploit-db.com/exploits/46481
nomisec
WORKING POC
by estebanzarate · poc
https://github.com/estebanzarate/CVE-2019-9194-elFinder-Command-Injection-PoC
vulncheck_xdb
WORKING POC
remote
https://github.com/estebanzarate/CVE-2019-9194-elFinder-Command-Injection-PoC-
metasploit
WORKING POC
EXCELLENT
by Thomas Chauchefoin, q3rv0, bcoles · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/elfinder_php_connector_exiftran_cmd_injection.rb
Nuclei Templates (1)
elFinder <= 2.1.47 - Command Injection
CRITICALVERIFIEDby r00tuser111
Shodan:
http.title:"elfinder"
References (5)
Scores
CVSS v3
9.8
EPSS
0.9285
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
VulnCheck KEV
2020-11-22
InTheWild.io
2019-11-01
CWE
CWE-78
Status
published
Products (2)
std42/elfinder
< 2.1.48
studio-42/elfinder
0 - 2.1.48Packagist
Published
Feb 26, 2019
Tracked Since
Feb 18, 2026