目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-29489 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Cpanel 跨站脚本漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Cpanel是美国Cpanel公司的一套基于Web的自动化主机托管平台。该平台主要用于自动化管理网站和服务器。 Cpanel 11.109.9999.116之前版本存在安全漏洞。攻击者利用该漏洞可以执行跨站脚本攻击。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2023-29489 的公开POC
#POC 描述源链接神龙链接
1Nuclei template for CVE-2023-29489https://github.com/learnerboy88/CVE-2023-29489POC详情
2Nonehttps://github.com/xKore123/cPanel-CVE-2023-29489POC详情
3a pyhton script to test all results from shodan for cPanel CVE-2023-29489, credits to @assetnote, I just automatehttps://github.com/ipk1/CVE-2023-29489.pyPOC详情
4Nonehttps://github.com/Mostafa-Elguerdawi/CVE-2023-29489.yamlPOC详情
5Nonehttps://github.com/Mostafa-Elguerdawi/CVE-2023-29489POC详情
6Scanner CVE-2023-29489 Python (Selenium)https://github.com/haxor1337x/Scanner-CVE-2023-29489POC详情
7To filter the actual vulnerable URLs from the screenshots, you can use the ee.sh script. Simply run ./ee.sh -f "path/to/index_screenshot.txt" -k "hacked" and the script will filter the URLs that contain the reflective XSS payload (For Example: cPanel CVE-2023-29489 ) in their screenshots.https://github.com/whalebone7/EagleEyePOC详情
8CVE-2023-29489 mass exploithttps://github.com/1337r0j4n/CVE-2023-29489POC详情
9CVE-2023-29489-XSShttps://github.com/Abdullah7-ma/CVE-2023-29489POC详情
10Nonehttps://github.com/tucommenceapousser/CVE-2023-29489POC详情
11Nonehttps://github.com/tucommenceapousser/CVE-2023-29489.pyPOC详情
12Mass Exploitation For (CVE-2023-29489)https://github.com/ViperM4sk/cpanel-xss-177POC详情
13Nonehttps://github.com/S4muraiMelayu1337/CVE-2023-29489POC详情
14SynixCyberCrimeMY CVE-2023-29489 Scanner By SamuraiMelayu1337 & h4zzzzzz@scchttps://github.com/SynixCyberCrimeMy/CVE-2023-29489POC详情
15Nonehttps://github.com/Makurorororororororo/Validate-CVE-2023-29489-scanner-POC详情
16This Tool is used to check for CVE-2023-29489 Vulnerability in the provided URL with the set of payloads availablehttps://github.com/prasad-1808/tool-29489POC详情
17Nonehttps://github.com/Praveenms13/CVE-2023-29489POC详情
18cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel.https://github.com/mdaseem03/cpanel_xss_2023POC详情
19# CVE-2023-29489 exploithttps://github.com/some-man1/CVE-2023-29489POC详情
20An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.https://github.com/Cappricio-Securities/CVE-2023-29489POC详情
21Nonehttps://github.com/md-thalal/CVE-2023-29489POC详情
22Mass Scaning vulnerability in Cpanel [XSS] https://github.com/0-d3y/CVE-2023-29489POC详情
23An issue was discovered in cPanel before 11.109.9999.116. Cross Site Scripting can occur on the cpsrvd error page via an invalid webcall ID. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-29489.yamlPOC详情
24Nonehttps://github.com/Thuankobtcode/CVE-2023-29489POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-29489 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-29489

暂无评论


发表评论