Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-6574 PoC — Google Go 安全漏洞

Source
Associated Vulnerability
Title:Google Go 安全漏洞 (CVE-2018-6574)
Description:Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
Readme
This repository holds a PoC of the CVE-2018-6574 "go get RCE", that allowed to execute commands when downloading a 3rd party package. This could be done, as the cflags allowed to set an external library. In this PoC, the external library executes a command on the constructor
File Snapshot

[4.0K] /data/pocs/f6a996545d09b1b0cd4044a52f68648392154965 ├── [ 197] exploit.c ├── [ 16K] exploit.so ├── [ 189] main.go └── [ 276] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →