Skip to content

Bash Script for Checking Command Injection Vulnerability on CentOS Web Panel [CWP] (CVE-2022-44877)

Notifications You must be signed in to change notification settings

Chocapikk/CVE-2022-44877

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

CVE-2022-44877

Overview

This bash script is used to test the vulnerability of web servers to CVE-2022-44877. The script performs a curl request to a target URL with a payload encoded in base64. If the target is vulnerable to the CVE-2022-44877 vulnerability, the elapsed time of the curl request will be greater than 3.5 seconds.

Installation

sudo apt-get update
sudo apt-get install curl bc
git clone https://github.com/Chocapikk/CVE-2022-44877
cd CVE-2022-44877
chmod +x script.sh

Usage

The script can be used in three different ways:

scan: To scan a single URL, run the following command:

./script.sh scan <URL>

exploit: To exploit a single URL, run the following command:

./script.sh exploit <URL> <payload>

masscan: To scan a list of URLs, either provide a file containing the list of URLs or pipe the list of URLs to the script:

./script.sh masscan <file>

or

echo <URLs> | ./script.sh masscan

Requirements

The script requires curl to be installed on the system.

Disclaimer

This script is for educational purposes only and should not be used for malicious purposes. The user is solely responsible for any actions taken with the script.

About

Bash Script for Checking Command Injection Vulnerability on CentOS Web Panel [CWP] (CVE-2022-44877)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages