Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-24329 PoC — Python 输入验证错误漏洞

Source
Associated Vulnerability
Title:Python 输入验证错误漏洞 (CVE-2023-24329)
Description:An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
File Snapshot

[4.0K] /data/pocs/3c5287f1171c9fc2bd5290b9ec77a69f4e52ce88 ├── [4.0K] python │   └── [1.8K] UnsanitizedUrlParse.ql ├── [ 116] qlpack.yml ├── [ 29] queries.xml └── [ 561] test.py 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →