mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-06-20 09:50:19 +00:00
37 lines
1.1 KiB
Python
37 lines
1.1 KiB
Python
#!/usr/bin/env python3
|
|
# _*_ coding:utf-8 _*_
|
|
'''
|
|
____ _ _ _ _ __ __ _
|
|
| _ \ __ _| |__ | |__ (_) |_| \/ | __ _ ___| | __
|
|
| |_) / _` | '_ \| '_ \| | __| |\/| |/ _` / __| |/ /
|
|
| _ < (_| | |_) | |_) | | |_| | | | (_| \__ \ <
|
|
|_| \_\__,_|_.__/|_.__/|_|\__|_| |_|\__,_|___/_|\_\
|
|
|
|
'''
|
|
import logging
|
|
import sys
|
|
import requests
|
|
|
|
logging.basicConfig(filename='Weblogic.log',
|
|
format='%(asctime)s %(message)s',
|
|
filemode="w", level=logging.INFO)
|
|
|
|
VUL=['CVE-2018-2894']
|
|
headers = {'user-agent': 'ceshi/0.0.1'}
|
|
|
|
def islive(ur,port):
|
|
url='http://' + str(ur)+':'+str(port)+'/ws_utc/resources/setting/options/general'
|
|
r = requests.get(url, headers=headers)
|
|
return r.status_code
|
|
|
|
def run(url,port,index):
|
|
if islive(url,port)!=404:
|
|
logging.info('[+]{}:{} has a JAVA deserialization vulnerability:{}.'.format(url,port,VUL[index]))
|
|
else:
|
|
logging.info('[-]{}:{} not detected {}.'.format(url,port,VUL[index]))
|
|
|
|
if __name__=="__main__":
|
|
url = sys.argv[1]
|
|
port = int(sys.argv[2])
|
|
run(url,port,0)
|