CVE-2019-9194

CRITICAL EXPLOITED IN THE WILD NUCLEI LAB

Std42 Elfinder < 2.1.48 - OS Command Injection

Title source: rule

Description

elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/46539
exploitdb WORKING POC VERIFIED
by q3rv0 · pythonwebappsphp
https://www.exploit-db.com/exploits/46481
nomisec WORKING POC
by estebanzarate · poc
https://github.com/estebanzarate/CVE-2019-9194-elFinder-Command-Injection-PoC
nomisec STUB
by cved-sources · poc
https://github.com/cved-sources/cve-2019-9194
vulncheck_xdb WORKING POC
remote
https://github.com/estebanzarate/CVE-2019-9194-elFinder-Command-Injection-PoC-
metasploit WORKING POC EXCELLENT
by Thomas Chauchefoin, q3rv0, bcoles · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/elfinder_php_connector_exiftran_cmd_injection.rb

Nuclei Templates (1)

elFinder <= 2.1.47 - Command Injection
CRITICALVERIFIEDby r00tuser111
Shodan: http.title:"elfinder"

Scores

CVSS v3 9.8
EPSS 0.9285
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2020-11-22
InTheWild.io 2019-11-01
CWE
CWE-78
Status published
Products (2)
std42/elfinder < 2.1.48
studio-42/elfinder 0 - 2.1.48Packagist
Published Feb 26, 2019
Tracked Since Feb 18, 2026