项目作者: filipsedivy

项目描述 :
CVE-2020-15227 checker
高级语言: Python
项目地址: git://github.com/filipsedivy/CVE-2020-15227.git
创建时间: 2020-11-15T15:30:01Z
项目社区:https://github.com/filipsedivy/CVE-2020-15227

开源协议:

下载


CVE-2020-15227

DISCLAIMER! I take no responsibility of using it in wild life environment so please do NOT do it. This thingy is just to demonstrate and for test things for sysadmins


This tool tests for vulnerability in nette/application.

How to fix the vulnerability

Composer

Update dependency to the latest version.

  • nette/application >=3.0.6
  • nette/application >=2.4.16
  • nette/application >=2.3.14
  • nette/application >=2.2.10
  • nette/nette >= 2.1.13
  • nette/nette >= 2.0.19

Add a new dependency roave/security-advisories into the project

Third-party patch tools

Description

List of tested vulnerabilities:

  • file_put_contents
  • Nette\Utils\FileSystem::write
  • shell_exec

Requiments

  • Python 3.x

Usage

  1. git clone https://github.com/filipsedivy/CVE-2020-15227
  2. cd CVE-2020-15227
  3. python main.py https://example.com

OR

  1. wget https://github.com/filipsedivy/CVE-2020-15227/archive/master.zip
  2. unzip master.zip
  3. cd CVE-2020-15227-master
  4. python main.py https://example.com

asciicast

API

Example

  1. from CVE_2020_1522 import CVE_2020_15227
  2. # Disable verbose
  3. cve = CVE_2020_15227(verbose=False)
  4. # Response True or False
  5. result = cve.run("https://example.com")
  6. if result is True:
  7. print('Fuck! Confirmed vulnerability! :-( Need update composer')
  8. else:
  9. print('Good night! Everything is okay. :)')

Related links