Skip to content
Test a host for susceptibility to CVE-2019-19781
Python Shell
Branch: develop
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Merge branch 'develop' of github.com:cisagov/skeleton-generic into im… Nov 18, 2019
src/check_cve Bump version Jan 14, 2020
tests Relax decoding of response data. Jan 14, 2020
.bandit.yml Split bandit pre-commit checks into two diffrent runs May 6, 2019
.coveragerc Rename library from skeleton Jan 10, 2020
.flake8 Add pydoc warnings to flake8 config May 3, 2019
.gitignore Add ignore for pytest cache directory May 5, 2019
.isort.cfg Add ability to pass in retries and timeout arguments. Jan 13, 2020
.mdl_config.json Add config file for markdownlint Jun 24, 2019
.pre-commit-config.yaml Merge branch 'develop' of github.com:cisagov/skeleton-generic into im… Dec 23, 2019
.prettierignore Configure prettier to ignore JSON files Jun 7, 2019
.yamllint First commit Mar 11, 2019
CONTRIBUTING.md Rename repository references after clone. Jan 10, 2020
LICENSE Rename LICENSE.md to LICENSE, make the other changes that requires Jun 24, 2019
README.md Bump version Jan 14, 2020
bump_version.sh Rename library from skeleton Jan 10, 2020
pytest.ini Add option to pytest to show extra test summary info May 5, 2019
requirements-dev.txt Move semver requirement from test requirements in setup.py to require… Jan 10, 2020
requirements-test.txt Add setup.py and requirements.txt Apr 4, 2019
requirements.txt Add setup.py and requirements.txt Apr 4, 2019
setup.py Merge branch 'develop' into improvement/retry-timeout-args Jan 14, 2020
tag.sh Add bump_version.sh and tag.sh to support bumping versions and taggin… Jan 10, 2020

README.md

check-cve-2019-19781 🔎🐞

GitHub Build Status Coverage Status Total alerts Language grade: Python Known Vulnerabilities

This utility determines if a host appears susceptible to CVE-2019-19781.

Requirements

Python versions 3.6 and above. Note that Python 2 is not supported.

Installation

From a release:

pip install https://github.com/cisagov/check-cve-2019-19781/releases/download/v1.0.2/cve_2019_19781-1.0.2-py3-none-any.whl

From source:

git clone https://github.com/cisagov/check-cve-2019-19781.git
cd check-cve-2019-19781
pip install -r requirements.txt

Usage

To scan a host:

❱ cve-2019-19781 citrix.example.org
2020-01-10 22:11:46,312 WARNING citrix.example.org appears to be vulnerable.

Detailed usage information can be viewed with:

❱ cve-2019-19781 --help

Check for the existence of CVE-2019-19781 on a host machine.

EXIT STATUS
    This utility exits with one of the following values:
    0   The host does not seem vulnerable
    1   Command was invoked incorrectly
    2   The host appears to be vulnerable
    >2  An error occurred.

For more information about this vulnerability see:
    https://nvd.nist.gov/vuln/detail/CVE-2019-19781

Usage:
  cve-2019-19781 [options] <host>
  cve-2019-19781 (-h | --help)

Options:
  -h --help              Show this message.
  --log-level=LEVEL      If specified, then the log level will be set to
                         the specified value.  Valid values are "debug", "info",
                         "warning", "error", and "critical". [default: info]
  -r --retries=count     Number of times to retry a failed connection attempt before
                         giving up. [default: 2]
  -t --timeout=seconds   Number of seconds to wait during each connection attempt.
                         [default: 10]

Contributing

We welcome contributions! Please see here for details.

License

This project is in the worldwide public domain.

This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.

All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.

You can’t perform that action at this time.