Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-39320 PoC — Google Go 代码注入漏洞

Source
Associated Vulnerability
Title:Google Go 代码注入漏洞 (CVE-2023-39320)
Description:Google Go是美国谷歌(Google)公司的一种静态强类型、编译型、并发型,并具有垃圾回收功能的编程语言。 Google Go 1.21版本存在安全漏洞,该漏洞源于工具链指令可用于执行相对于模块根目录的脚本和二进制文件。
File Snapshot

[4.0K] /data/pocs/2bba9d6f32e694685619f1dee9cba19478a01a0e ├── [4.0K] go1.9999- │   ├── [1.9K] gagscript.py │   ├── [ 48] malicious_script.bat │   └── [ 54] malicious_script.sh ├── [ 63] go.mod ├── [ 62] go.mod.linux ├── [ 63] go.mod.windows └── [ 77] main.go 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.