Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-4476 PoC — libsoup 代码问题漏洞

Source
Associated Vulnerability
Title:libsoup 代码问题漏洞 (CVE-2025-4476)
Description:libsoup是GNOME项目的一款GNOME的HTTP客户端/服务器库。 libsoup存在代码问题漏洞,该漏洞源于处理特定构造的WWW-Authenticate标头可能导致客户端应用程序崩溃,可能导致拒绝服务攻击。
Readme
# CVE-2025-4476-Exploit

A small Python test client to send HTTP GET requests with an oversized Authorization: Basic header.
This tool is intended for lab testing and research into header-parsing issues (e.g., null-dereference / crash bugs such as CVE-2025-4476 in libsoup). It demonstrates how a client-server exchange with malformed headers can trigger parsing errors; it is not an exploit framework.

Usage: run against a local or authorized test target only.
Important: use responsibly — do not scan or attack systems without explicit permission.
File Snapshot

[4.0K] /data/pocs/b015a0342013a559ca051cdb6d4156ed6499b0b0 ├── [ 553] README.md └── [5.3K] send_auth_request.py 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.