POC详情: 385f27a796ebb11bdf7ef505fea8bf57596f52c5

来源
关联漏洞
标题: Citrix Application Delivery Controller和Citrix Systems Gateway 路径遍历漏洞 (CVE-2019-19781)
描述:Citrix Systems NetScaler Gateway(Citrix Systems Gateway)和Citrix Application Delivery Controller(ADC)都是美国思杰系统(Citrix Systems)公司的产品。Citrix Systems NetScaler Gateway是一套安全的远程接入解决方案。该方案可为管理员提供应用级和数据级管控功能,以实现用户从任何地点远程访问应用和数据。Citrix Application Delivery Controll
描述
Test a host for susceptibility to CVE-2019-19781
介绍
# check-cve-2019-19781 🔎🐞 #

[![GitHub Build Status](https://github.com/cisagov/check-cve-2019-19781/workflows/build/badge.svg)](https://github.com/cisagov/check-cve-2019-19781/actions)
[![Coverage Status](https://coveralls.io/repos/github/cisagov/check-cve-2019-19781/badge.svg?branch=develop)](https://coveralls.io/github/cisagov/check-cve-2019-19781?branch=develop)
[![Total alerts](https://img.shields.io/lgtm/alerts/g/cisagov/check-cve-2019-19781.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/projects/g/cisagov/check-cve-2019-19781/alerts/)
[![Language grade: Python](https://img.shields.io/lgtm/grade/python/g/cisagov/check-cve-2019-19781.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/projects/g/cisagov/check-cve-2019-19781/context:python)
[![Known Vulnerabilities](https://snyk.io/test/github/cisagov/check-cve-2019-19781/develop/badge.svg)](https://snyk.io/test/github/cisagov/check-cve-2019-19781)

This utility determines if a host appears susceptible to
[CVE-2019-19781](https://nvd.nist.gov/vuln/detail/CVE-2019-19781).

## Requirements ##

Python versions 3.6 and above.  Note that Python 2 *is not* supported.

## Installation ##

From a release:

```console
pip install https://github.com/cisagov/check-cve-2019-19781/releases/download/v1.0.2/cve_2019_19781-1.0.2-py3-none-any.whl
```

From source:

```console
git clone https://github.com/cisagov/check-cve-2019-19781.git
cd check-cve-2019-19781
pip install -r requirements.txt
```

## Usage ##

To scan a host:

```console
❱ cve-2019-19781 citrix.example.org
```

```console
2020-01-10 22:11:46,312 WARNING citrix.example.org appears to be vulnerable.
```

Detailed usage information can be viewed with:

```console
❱ cve-2019-19781 --help

Check for the existence of CVE-2019-19781 on a host machine.

EXIT STATUS
    This utility exits with one of the following values:
    0   The host does not seem vulnerable
    1   Command was invoked incorrectly
    2   The host appears to be vulnerable
    >2  An error occurred.

For more information about this vulnerability see:
    https://nvd.nist.gov/vuln/detail/CVE-2019-19781

Usage:
  cve-2019-19781 [options] <host>
  cve-2019-19781 (-h | --help)

Options:
  -h --help              Show this message.
  --log-level=LEVEL      If specified, then the log level will be set to
                         the specified value.  Valid values are "debug", "info",
                         "warning", "error", and "critical". [default: info]
  -r --retries=count     Number of times to retry a failed connection attempt before
                         giving up. [default: 2]
  -t --timeout=seconds   Number of seconds to wait during each connection attempt.
                         [default: 10]
```

## Contributing ##

We welcome contributions!  Please see [`CONTRIBUTING.md`](CONTRIBUTING.md) for
details.

## License ##

This project is in the worldwide [public domain](LICENSE).

This project is in the public domain within the United States, and
copyright and related rights in the work worldwide are waived through
the [CC0 1.0 Universal public domain
dedication](https://creativecommons.org/publicdomain/zero/1.0/).

All contributions to this project will be released under the CC0
dedication. By submitting a pull request, you are agreeing to comply
with this waiver of copyright interest.
文件快照

[4.0K] /data/pocs/385f27a796ebb11bdf7ef505fea8bf57596f52c5 ├── [1.8K] bump_version.sh ├── [5.5K] CONTRIBUTING.md ├── [6.4K] LICENSE ├── [ 32] pytest.ini ├── [3.2K] README.md ├── [ 51] requirements-dev.txt ├── [ 50] requirements-test.txt ├── [ 19] requirements.txt ├── [4.9K] setup-env ├── [3.4K] setup.py ├── [4.0K] src │   └── [4.0K] check_cve │   ├── [4.1K] check.py │   ├── [ 118] __init__.py │   ├── [ 95] __main__.py │   └── [ 74] _version.py ├── [ 142] tag.sh └── [4.0K] tests ├── [ 880] conftest.py └── [5.9K] test_check_cve.py 3 directories, 17 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。