CVE-2019-5010 Exploit PoC - Python Denial of Service via Malformed X.509v3 Extension# CVE-2019-5010
* Author: [Jonathan M. Wilbur](https://github.com/JonathanWilbur) <[jonathan@wilbur.space](mailto:jonathan@wilbur.space)>
* Copyright Year: 2019
* License: [MIT License](https://mit-license.org/)
## How to use
1. Install all dependencies by running `npm install`.
2. Compile the project using `npm run build`.
3. Run `node ./dist/index.js` to create the evil certificate in `./dist/cve-2019-5010-cert.pem`.
4. Bring up the victim container with `docker-compose up`.
This is honestly probably the most unimpressive exploit ever. The docker
container will crash with exit code 139 if you are successful and 0 if
the exploit does not work.
[4.0K] /data/pocs/78b9d0183a64ae5693c508e3e39260adec05dbd3
├── [ 279] babel.config.js
├── [3.6K] CONTRIBUTING.md
├── [ 401] docker-compose.yaml
├── [ 153] Dockerfile
├── [4.0K] documentation
├── [1.1K] Jenkinsfile
├── [6.3K] jest.config.js
├── [1.1K] LICENSE.txt
├── [ 46] Makefile
├── [1.7K] package.json
├── [460K] package-lock.json
├── [ 673] README.md
├── [2.1K] serverless.yml
├── [4.0K] source
│ ├── [ 425] demo.py
│ ├── [3.3K] generateCertificate.ts
│ └── [ 246] index.ts
├── [4.0K] test
│ ├── [4.0K] jest
│ │ └── [ 71] index.test.js
│ └── [ 451] testpage.html
├── [1.5K] tsconfig.json
└── [ 717] webpack.config.js
4 directories, 19 files