Skip to content

0x2458bughunt/CVE-2023-25157

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2023-25157

This is a simple Python Script to Find the Latest GeoServer SQL Injection Vulnerability. You can use the Scripts on hosts to check for infected path.

Installation:

  1. git clone https://github.com/0x2458bughunt/CVE-2023-25157/
  2. cd CVE-2023-25157
  3. chmod +x geoserver.sh

Note: You should have all the files on same directory, in case you want to use the files from anywhere throughout your system, follow these steps:

  1. Open geoserver.sh and change GeoServerPath-Finder.py with it's full path. (Eg- /root/CVE-2023-25157/GeoServerPath-Finder.py)
  2. Do the same with GeoServer_Keyword-Checker.py.
  3. copy geoserver.sh to /usr/bin. Now you can access it from anywhere around your system! :D

#Usage: ./geoserver.sh /path/to/hosts/file/

If it finds the directory It'll Respong with "Directory Found" follwing with full URL. image

Else It'll give output as "Directory Not Found" image

Then It'll check for the specific keyword to verify if the URL really has GeoServer directory open or not. This process has been added to avoid false positives. If found It'll give output in final_output.txt as "Keyword Found on https://website123.com/" If the keyword dosen't match, It'll give output as: "Keyword not Found on https://website123.com/"

Hope you like this! This is my first every Github Project! If you wanna show love to this, leave a star and follow my socials! Twitter: https://twitter.com/0x2458 BuyMeACoffee: https://buymeacoffee.com/0x2458/

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published