关联漏洞
描述
Simple POC for CVE-2019-16394
介绍
# CVE-2019-16394
A simple POC python script of CVE-2019-16394
Script is adjusted for a french website, you may need to modify it if the website language is different.
## Install
```bash
pip install -r requirements.txt
```
## Usage
```bash
usage: cve_2019_16394.py [-h] -u URL -f FILE [-v]
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL Base Target URL (without the spip.php)
-f FILE, --file FILE File containing the mails to test
-v, --verbose Verbose output
```
## Links
https://www.cvedetails.com/cve/CVE-2019-16394/
https://zone.spip.net/trac/spip-zone/changeset/117577/spip-zone
文件快照
[4.0K] /data/pocs/716b8ee1eb0c78a07fdde1ea0fbbd460054bd585
├── [1.8K] cve_2019_16394.py
├── [ 658] README.md
└── [ 24] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。