Skip to content

Chocapikk/CVE-2022-27925-Revshell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Zimbra Unauthenticated Remote Code Execution Exploit (CVE-2022-27925)

 _____   _           __              
/__  /  (_)___ ___  / /_  _________ _
  / /  / / __ `__ \/ __ \/ ___/ __ `/
 / /__/ / / / / / / /_/ / /  / /_/ / 
/____/_/_/ /_/ /_/_.___/_/   \__,_/  
                    CVE-2022-27925   
            
usage: exp.py [-h] [-t TARGET] [-m MASS] [-l LHOST] [-p LPORT]

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        URl with protocol HTTPS
  -m MASS, --mass MASS  List of targets
  -l LHOST, --lhost LHOST
                        Local IP for reverse shell
  -p LPORT, --lport LPORT
                        Local port for reverse shell

About

Python Script to exploit Zimbra Auth Bypass + RCE (CVE-2022-27925)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages