基于GO的exp和poc## 前言
GO语言版 [CVE-2020-11546](https://nvd.nist.gov/vuln/detail/CVE-2020-11546) 利用工具,全当练手GO语言了
## 用法
```shell
go get -u -v github.com/damit5/CVE-2020-11546@master
CVE-2020-11546 <target>
```

## 自己编译
```shell
git clone https://github.com/damit5/CVE-2020-11546
bash build.sh
```

[4.0K] /data/pocs/d81f1ad016a7825404facae5a6e55f6fc0b3fb79
├── [ 332] build.sh
├── [ 49] go.mod
├── [4.0K] README.assets
│ ├── [ 25K] image-20211229150608970.png
│ └── [2.3M] image-20211229152446871.png
├── [ 467] README.md
├── [4.0K] release
│ ├── [4.6M] superwebmailerRCE_darwin
│ ├── [4.4M] superwebmailerRCE_linux
│ └── [4.4M] superwebmailerRCE_win.exe
└── [2.7K] superwebmailer_rce_cve_2020_11546.go
2 directories, 9 files