0x2458bughunt / CVE-2023-25157

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2023-25157

This is a simple Python Script to Find the Latest GeoServer SQL Injection Vulnerability. You can use the Scripts on hosts to check for infected path.

Installation:

  1. git clone https://github.com/0x2458bughunt/CVE-2023-25157/
  2. cd CVE-2023-25157
  3. chmod +x geoserver.sh

Note: You should have all the files on same directory, in case you want to use the files from anywhere throughout your system, follow these steps:

  1. Open geoserver.sh and change GeoServerPath-Finder.py with it's full path. (Eg- /root/CVE-2023-25157/GeoServerPath-Finder.py)
  2. Do the same with GeoServer_Keyword-Checker.py.
  3. copy geoserver.sh to /usr/bin. Now you can access it from anywhere around your system! :D

#Usage: ./geoserver.sh /path/to/hosts/file/

If it finds the directory It'll Respong with "Directory Found" follwing with full URL. image

Else It'll give output as "Directory Not Found" image

Then It'll check for the specific keyword to verify if the URL really has GeoServer directory open or not. This process has been added to avoid false positives. If found It'll give output in final_output.txt as "Keyword Found on https://website123.com/" If the keyword dosen't match, It'll give output as: "Keyword not Found on https://website123.com/"

Hope you like this! This is my first every Github Project! If you wanna show love to this, leave a star and follow my socials! Twitter: https://twitter.com/0x2458 BuyMeACoffee: https://buymeacoffee.com/0x2458/

About

License:MIT License


Languages

Language:Python 87.5%Language:Shell 12.5%