Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2018-6574
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Google Go 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Google Go是美国谷歌(Google)公司的一种针对多处理器系统应用程序的编程进行了优化的编程语言。 Google Go 1.8.7之前版本、1.9.4之前的1.9.x版本和1.10rc2之前的1.10 pre-releases版本中存在安全漏洞。远程攻击者可利用该漏洞执行命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2018-6574
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/acole76/cve-2018-6574POC Details
2CVE-2018-6574 POC : golang 'go get' remote command execution during source code buildhttps://github.com/neargle/Go-Get-RCE-CVE-2018-6574-POCPOC Details
3CVE-2018-6574 for pentesterLABhttps://github.com/wb4r/go-get-rcePOC Details
4cve-2018-6574 @pentesterlabhttps://github.com/ahmetmanga/go-get-rcePOC Details
5Nonehttps://github.com/ahmetmanga/cve-2018-6574POC Details
6Nonehttps://github.com/redirected/cve-2018-6574POC Details
7Nonehttps://github.com/20matan/CVE-2018-6574-POCPOC Details
8CVE-2018-6574https://github.com/zur250/Zur-Go-GET-RCE-SolutionPOC Details
9Nonehttps://github.com/mekhalleh/cve-2018-6574POC Details
10CVE-2018-6574https://github.com/veter069/go-get-rcePOC Details
11Nonehttps://github.com/duckzsc2/CVE-2018-6574-POCPOC Details
12Nonehttps://github.com/dollyptm/cve-2018-6574POC Details
13A simple POC for CVE-2018-6574https://github.com/qweraqq/CVE-2018-6574POC Details
14CVE-2018-6574https://github.com/d4rkshell/go-get-rcePOC Details
15Nonehttps://github.com/chaosura/CVE-2018-6574POC Details
16ptl cve-2018-6574https://github.com/french560/ptl6574POC Details
17Nonehttps://github.com/InfoSecJack/CVE-2018-6574POC Details
18CVE-2018-6574 go get RCEhttps://github.com/asavior2/CVE-2018-6574POC Details
19test for CVE-2018-6574: go get RCE pentesterlabhttps://github.com/drset/golangPOC Details
20Nonehttps://github.com/frozenkp/CVE-2018-6574POC Details
21pentesterlab test payloadhttps://github.com/kev-ho/cve-2018-6574-payloadPOC Details
22Nonehttps://github.com/sdosis/cve-2018-6574POC Details
23Nonehttps://github.com/No1zy/CVE-2018-6574-PoCPOC Details
24Nonehttps://github.com/nthuong95/CVE-2018-6574POC Details
25Nonehttps://github.com/AdriVillaB/CVE-2018-6574POC Details
26Nonehttps://github.com/yitingfan/CVE-2018-6574_demoPOC Details
27Nonehttps://github.com/mhamed366/CVE-2018-6574POC Details
28Nonehttps://github.com/Eugene24/CVE-2018-6574POC Details
29Nonehttps://github.com/coblax/CVE-2018-6574POC Details
30CVE-2018-6574https://github.com/darthvader-htb/CVE-2018-6574POC Details
31Vulnerble-codehttps://github.com/it3x55/CVE-2018-6574POC Details
32CVE-2018-6574: go get RCE solution for pentesterlab challengehttps://github.com/Malone5923/CVE-2018-6574-go-get-RCEPOC Details
33Nonehttps://github.com/illnino/CVE-2018-6574POC Details
34Nonehttps://github.com/TakuCoder/CVE-2018-6574POC Details
35Nonehttps://github.com/kawkab101/cve-2018-6574POC Details
36Nonehttps://github.com/lsnakazone/cve-2018-6574POC Details
37Nonehttps://github.com/pswalia2u/CVE-2018-6574POC Details
38A simple POC for CVE-2018-6574https://github.com/jongmartinez/CVE-2018-6574-POCPOC Details
39Nonehttps://github.com/azzzzzzzzzzzzzzzzz/CVE-2018-6574POC Details
40Nonehttps://github.com/noname-nohost/CVE-2018-6574POC Details
41Nonehttps://github.com/shadofren/CVE-2018-6574POC Details
42Nonehttps://github.com/NikolaT3sla/cve-2018-6574POC Details
43Nonehttps://github.com/vishack/CVE-2018-6574POC Details
44Nonehttps://github.com/PLP-Orange/cve-2018-6574-exercisePOC Details
45Nonehttps://github.com/purgedemo/CVE-2018-6574POC Details
46Nonehttps://github.com/purgedemo/CVE-2018-6574_2POC Details
47Nonehttps://github.com/killtr0/POC-CVE-2018-6574POC Details
48solutionhttps://github.com/theJuan1112/pentesterlab-cve-2018-6574POC Details
49Nonehttps://github.com/MohamedTarekq/test-CVE-2018-6574-POC Details
50Nonehttps://github.com/OLAOLAOLA789/CVE-2018-6574POC Details
51Nonehttps://github.com/repos13579/labCVE-2018-6574POC Details
52Pentesterlabshttps://github.com/yashanand/cve-2018-6574POC Details
53go rcehttps://github.com/jaya522/CVE-2018-6574-go-get-RCEPOC Details
54Nonehttps://github.com/noobTest1122/CVE-2018-6574POC Details
55Nonehttps://github.com/ErnestZiemkowski/cve-2018-6574POC Details
56Nonehttps://github.com/l3ouu4n9/CVE-2018-6574-POCPOC Details
57PTLabshttps://github.com/R3dAlch3mist/cve-2018-6574POC Details
58Remote command execution in Golang go get command allows an attacker to gain code execution on a system by installing a malicious library.https://github.com/j4k0m/CVE-2018-6574POC Details
59Exploit for remote command execution in Golang go get command.https://github.com/Devang-Solanki/CVE-2018-6574POC Details
60Nonehttps://github.com/ItsFadinG/CVE-2018-6574POC Details
61Nonehttps://github.com/imojne/CVE-2018-6574-POCPOC Details
62cve-2018-6574https://github.com/twseptian/cve-2018-6574POC Details
63Nonehttps://github.com/the-valluvarsploit/CVE-2018-6574POC Details
64Nonehttps://github.com/yavolo/CVE-2018-6574POC Details
65CVE-2018-6574: go get RCEhttps://github.com/ThaFWord/pentesterlabPOC Details
66Exploit for Pentester Labshttps://github.com/Cypheer/exploit_CVE-2018-6574POC Details
67Nonehttps://github.com/jftierno/CVE-2018-6574-2POC Details
68Nonehttps://github.com/tjcim/cve-2018-6574POC Details
69Nonehttps://github.com/markisback/CVE-2018-6574POC Details
70The issue is due to the fact that when installing a package, Golang will build native extensions. This can be used to pass additional flags to the compiler to gain code execution. For example, CFLAGS can be used.https://github.com/hasharmujahid/CVE-2018-6574-go-get-RCEPOC Details
71Nonehttps://github.com/jeyaseelans86/CVE-2018-6574POC Details
72Nonehttps://github.com/jeyaseelans86/new-CVE-2018-6574POC Details
73Nonehttps://github.com/chr1sM/CVE-2018-6574POC Details
74Nonehttps://github.com/mux0x/CVE-2018-6574POC Details
75CVE-2018-6574 go gethttps://github.com/antunesmpedro/CVE-2018-6574POC Details
76Nonehttps://github.com/Yealid/CVE-2018-6574POC Details
77Used for a PentesterLab exercisehttps://github.com/jahwni/CVE-2018-6574POC Details
78Nonehttps://github.com/NsByte/CVE-2018-6574POC Details
79Nonehttps://github.com/Zeeshan12340/CVE-2018-6574POC Details
80Nonehttps://github.com/moTorky/CVE-2018-6574-POCPOC Details
81CVE-2018-6574: go get RCEhttps://github.com/Ashved9/OrangePOC Details
82CVE-2018-6574 this vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system by installing a malicious library, this vulnerability was fixed in Go 1.8. 7, 1.9. 4 and 1.10rc2. Golang will build native extensions.https://github.com/zerbaliy3v/cve-2018-6574-exploitPOC Details
83Pentesterlabshttps://github.com/sec000/cve-2018-6574POC Details
84Nonehttps://github.com/jftierno/-CVE-2018-6574POC Details
85Nonehttps://github.com/jftierno/CVE-2018-6574POC Details
86Nonehttps://github.com/faiqu3/cve-2018-6574POC Details
87CVE-2018-6574-go-get-RCEhttps://github.com/Dannners/CVE-2018-6574-go-get-RCEPOC Details
88Nonehttps://github.com/bme2003/CVE-2018-6574POC Details
89Nonehttps://github.com/athulmur/CVE-2018-6574POC Details
90pentesterlabhttps://github.com/iNoSec2/cve-2018-6574POC Details
91Nonehttps://github.com/ttyA0/cve-2018-6574POC Details
92CVE-2018-6574: go gethttps://github.com/faqihudin13/CVE-2018-6574POC Details
93Nonehttps://github.com/lisu60/cve-2018-6574POC Details
94Nonehttps://github.com/Saboor-Hakimi/CVE-2018-6574POC Details
95Remote command execution in Golang go get command allows an attacker to gain code execution on a system by installing a malicious library.https://github.com/seoqqq/CVE-2018-6574POC Details
96OrangeBadge - Exercise CVE-2018-6574: go get RCEhttps://github.com/elw0od/PentesterLabPOC Details
97Nonehttps://github.com/rootxjs/CVE-2018-6574POC Details
98Nonehttps://github.com/rootxjs/new-CVE-2018-6574POC Details
99Golang cgo exploit for CVE-2018-6574https://github.com/paulogmota/CVE-2018-6574POC Details
100POC of CVE-2018-6574 to solve Pentestlab challengehttps://github.com/solovvway/CVE-2018-6574POC Details
101Nonehttps://github.com/memmas/CVE-2018-6574POC Details
102Ptlabs exploithttps://github.com/adendarys/CVE-2018-6574POC Details
103Nonehttps://github.com/YoussefSalama1/CVE-2018-6574POC Details
104Nonehttps://github.com/Rezy-Dev/CVE-2018-6574POC Details
105Testinghttps://github.com/hbxxv/CVE-2018-6574POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2018-6574
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2018-6574

No comments yet


Leave a comment