Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6690 PoC — python-gnupg 输入验证错误漏洞

Source
Associated Vulnerability
Title:python-gnupg 输入验证错误漏洞 (CVE-2019-6690)
Description:python-gnupg是一款用于处理与GnuPG交互的Python接口的软件包,它包括秘钥文件生成、秘钥导出和导入等功能。 python-gnupg 0.4.3版本中存在输入验证错误漏洞,该漏洞源于程序没有正确地过滤用户提交的输入。远程攻击者可利用该漏洞在受影响应用程序的上下文中注入并执行任意代码,访问或修改数据。
Description
It is a simple PoC of Improper Input Validation in python-gnupg 0.4.3 (CVE-2019-6690).
Readme
# Summary

It is a simple PoC of Improper Input Validation in python-gnupg 0.4.3 (CVE-2019-6690).

# Vulnerable

* python python-gnupg 0.4.3
* python python-gnupg 0.3.6
* python python-gnupg 0.3.5
* python python-gnupg 0.3.4 

# Mitigation

Users should upgrade to 0.4.4

# Test Environment

## Docker Image

* docker pull avfisherdocker/python-gnupg0.4.3:CVE-2019-6690
* docker run -d -p 5000:5000 avfisherdocker/python-gnupg0.4.3:CVE-2019-6690

# Proof of Concepts

1. `apt install libmojolicious-perl`
2. `git clone https://github.com/brianwrf/CVE-2019-6690`
3. `cd CVE-2019-6690`
4. `perl exploit.pl <ip> <port>`

# Reference

* <https://github.com/stigtsp/CVE-2019-6690-python-gnupg-vulnerability>
* <https://seclists.org/bugtraq/2019/Jan/41>
* <https://www.securityfocus.com/bid/106756>
File Snapshot

[4.0K] /data/pocs/2756a432571e49206b15556987d2993ce3815d0b ├── [4.0K] env │   └── [ 400] Dockerfile ├── [1.0K] exploit.pl └── [ 793] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.