Skip to content

Pushkarup/CVE-2022-29464

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-29464

image

Introduction

Critical WSO2 vulnerability CVE-2022-29464 was found by Orange Tsai. The flaw is an unauthorised, unconstrained arbitrary file upload that enables unauthorised users to submit malicious JSP files to WSO2 servers and get Remote Code Execution (RCE).

Disclaimer: Educational Purpose Only

This Exploit and Proof of Concept (PoC) is presented solely for educational and informational purposes. The intent behind sharing this is to demonstrate potential vulnerabilities in a controlled environment. The goal is to promote understanding of cybersecurity concepts and encourage responsible disclosure.

Important Points:

  • Ethical Use: This Exploit and PoC should only be used in environments and systems where you have explicit authorization. Unauthorized access to computer systems is illegal and unethical.
  • Responsible Disclosure: If you discover vulnerabilities as a result of this Exploit and PoC, it is strongly recommended to report them responsibly to the relevant parties, allowing them adequate time to address and mitigate the issues.
  • No Endorsement: This PoC and related materials do not endorse or encourage any form of unauthorized access, hacking, or any other illegal activities.

By accessing and using this Exploit and PoC, you acknowledge that you are solely responsible for your actions and agree to use this information in compliance with applicable laws and regulations. The author assumes no liability for any misuse or consequences arising from the use of this PoC for any purpose other than education and responsible disclosure.

Exploit Features

  • Single Scan: Scanning a single site for Exploit.
  • Mass Scan: Scanning list of site from a file for Exploit.
  • Threading: Using Threads for fast processing.

WEBSHELL Features

  • User-friendly UI: To improve communication between the user and the server, the webshell's user interface has been kept as basic as possible.
  • RCE Webshell: Complete remote code execution functionality on the shell
  • 30 Code Injection Predefined Commands: A drop-down menu with 30 instructions ranging from basic to advanced has been introduced for easier use and comprehension. 
  • Asynchronous requests: For Making the server work smoothly we employed asynchronous requests.

WEBSHELL INTERFACE

git.resource.mp4

Getting Started

Prerequisites

  • Python 3.x
  • Required Python packages: requests, colorama , urllib3

Installation

  1. Clone the repository:

    git clone https://github.com/Pushkarup/CVE-2022-29464.git
    cd CVE-2022-29464
  2. Install the required Python packages:

    pip install -r requirements.txt

Usage

  1. Create a text file containing the target sites (one per line) and save it with a .txt extension.
  • Collect site list for test using dork "WSO2 Identity Server" site:* , "WSO2" OR "Identity Server" site:*
  1. Run the script:

    python wso.py
  2. Let the script run its course and follow the directions.

  3. Every site that has been exploited will be stored to Results.txt.

  4. By utilising my webshell that has been posted there, you may access those Backdoors and execute command injection.

Contributing

Contributions are welcome! If you find any issues or have improvements, feel free to open a pull request or create an issue.

License

This project is licensed under the MIT License.

Contact

Donations

Show your support

  • BTC: 3QqVBBzDBezA9U77PCTwMPQVGb1eecv2SP
  • ETH: 0xB779767483831BD98327A449C78FfccE2cc6df0a
  • USDT: 0xB779767483831BD98327A449C78FfccE2cc6df0a

About

A PoC and Exploit for CVE 2022-29464

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published