Skip to content

filipsedivy/CVE-2020-15227

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2020-15227

DISCLAIMER! I take no responsibility of using it in wild life environment so please do NOT do it. This thingy is just to demonstrate and for test things for sysadmins


This tool tests for vulnerability in nette/application.

How to fix the vulnerability

Composer

Update dependency to the latest version.

  • nette/application >=3.0.6
  • nette/application >=2.4.16
  • nette/application >=2.3.14
  • nette/application >=2.2.10
  • nette/nette >= 2.1.13
  • nette/nette >= 2.0.19

Add a new dependency roave/security-advisories into the project

Third-party patch tools

Description

List of tested vulnerabilities:

  • file_put_contents
  • Nette\Utils\FileSystem::write
  • shell_exec

Requiments

  • Python 3.x

Usage

git clone https://github.com/filipsedivy/CVE-2020-15227
cd CVE-2020-15227
python main.py https://example.com

OR

wget https://github.com/filipsedivy/CVE-2020-15227/archive/master.zip
unzip master.zip
cd CVE-2020-15227-master
python main.py https://example.com

asciicast

API

Example

from CVE_2020_1522 import CVE_2020_15227

# Disable verbose
cve = CVE_2020_15227(verbose=False)

# Response True or False
result = cve.run("https://example.com")

if result is True:
    print('Fuck! Confirmed vulnerability! :-( Need update composer')
else:
    print('Good night! Everything is okay. :)')

Related links

About

CVE-2020-15227 checker

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages