WhiteOwl-Pub / PoC-SolarView-Compact-CVE-2023-23333

command injection vulnerability in SolarView Compact poc version 6.0

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

PoC for CVE-2023-23333 (solarView-Compact)

banner This script checks if an IP address is vulnerable to CVE-2023-23333. It utilizes the curl command to execute a specific command on the target device and capture the output. If the IP address is vulnerable, it displays the output and saves the full output to a file.

Prerequisites

  • Python 3.x
  • curl command-line tool

Usage

  1. Clone the repository:

    git clone https://github.com/WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333.git
    
     Change into the project directory:
    
     shell
    
     cd PoC-SolarView-Compact-CVE-2023-23333
    

Run the script:

shell

python script.py

When prompted, enter the IP address and port of the device in the format: 10.10.10.10:82

The script will execute the command and display the vulnerability status. If the IP address is vulnerable, it will show the output.

The full output will be saved to a file named full-output.txt in the same directory.

This script is for educational and informational purposes only. Use it responsibly and at your own risk.

About

command injection vulnerability in SolarView Compact poc version 6.0


Languages

Language:Python 100.0%