check-cve-2019-19781 🔎🐞
This utility determines if a host appears susceptible to CVE-2019-19781.
Requirements
Python versions 3.6 and above. Note that Python 2 is not supported.
Installation
From a release:
pip install https://github.com/cisagov/check-cve-2019-19781/releases/download/v1.0.2/cve_2019_19781-1.0.2-py3-none-any.whl
From source:
git clone https://github.com/cisagov/check-cve-2019-19781.git
cd check-cve-2019-19781
pip install -r requirements.txt
Usage
To scan a host:
❱ cve-2019-19781 citrix.example.org
2020-01-10 22:11:46,312 WARNING citrix.example.org appears to be vulnerable.
Detailed usage information can be viewed with:
❱ cve-2019-19781 --help
Check for the existence of CVE-2019-19781 on a host machine.
EXIT STATUS
This utility exits with one of the following values:
0 The host does not seem vulnerable
1 Command was invoked incorrectly
2 The host appears to be vulnerable
>2 An error occurred.
For more information about this vulnerability see:
https://nvd.nist.gov/vuln/detail/CVE-2019-19781
Usage:
cve-2019-19781 [options] <host>
cve-2019-19781 (-h | --help)
Options:
-h --help Show this message.
--log-level=LEVEL If specified, then the log level will be set to
the specified value. Valid values are "debug", "info",
"warning", "error", and "critical". [default: info]
-r --retries=count Number of times to retry a failed connection attempt before
giving up. [default: 2]
-t --timeout=seconds Number of seconds to wait during each connection attempt.
[default: 10]
Contributing
We welcome contributions! Please see CONTRIBUTING.md
for
details.
License
This project is in the worldwide public domain.
This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.
All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.