2019-08-31 10:33:26 +08:00

37 lines
1.1 KiB
Python

#!/usr/bin/env python3
# _*_ coding:utf-8 _*_
'''
____ _ _ _ _ __ __ _
| _ \ __ _| |__ | |__ (_) |_| \/ | __ _ ___| | __
| |_) / _` | '_ \| '_ \| | __| |\/| |/ _` / __| |/ /
| _ < (_| | |_) | |_) | | |_| | | | (_| \__ \ <
|_| \_\__,_|_.__/|_.__/|_|\__|_| |_|\__,_|___/_|\_\
'''
import logging
import sys
import requests
logging.basicConfig(filename='Weblogic.log',
format='%(asctime)s %(message)s',
filemode="w", level=logging.INFO)
VUL=['CVE-2018-2894']
headers = {'user-agent': 'ceshi/0.0.1'}
def islive(ur,port):
url='http://' + str(ur)+':'+str(port)+'/ws_utc/resources/setting/options/general'
r = requests.get(url, headers=headers)
return r.status_code
def run(url,port,index):
if islive(url,port)!=404:
logging.info('[+]{}:{} has a JAVA deserialization vulnerability:{}.'.format(url,port,VUL[index]))
else:
logging.info('[-]{}:{} not detected {}.'.format(url,port,VUL[index]))
if __name__=="__main__":
url = sys.argv[1]
port = int(sys.argv[2])
run(url,port,0)