Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-44877 PoC — CentOS Web Panel 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:CentOS Web Panel 操作系统命令注入漏洞 (CVE-2022-44877)
Description:CentOS Web Panel(CWP)是Control Web Panel社区的一款免费的虚拟主机控制面板。 Centos Web Panel 7 v0.9.8.1147之前版本存在安全漏洞,该漏洞源于/login/index.php组件存在问题,允许未经身份验证的攻击者通过精心设计的HTTP请求执行任意系统命令。
Description
Bash Script for Checking Command Injection Vulnerability  on CentOS Web Panel [CWP] (CVE-2022-44877)
Readme
# CVE-2022-44877 

## Overview

This bash script is used to test the vulnerability of web servers to CVE-2022-44877. The script performs a curl request to a target URL with a payload encoded in base64. If the target is vulnerable to the CVE-2022-44877 vulnerability, the elapsed time of the curl request will be greater than 3.5 seconds.


## Installation

```bash
sudo apt-get update
sudo apt-get install curl bc
git clone https://github.com/Chocapikk/CVE-2022-44877
cd CVE-2022-44877
chmod +x script.sh
```

## Usage

The script can be used in three different ways:

`scan`: To scan a single URL, run the following command:

```bash
./script.sh scan <URL>
```

`exploit`: To exploit a single URL, run the following command:

```bash
./script.sh exploit <URL> <payload>
```

`masscan`: To scan a list of URLs, either provide a file containing the list of URLs or pipe the list of URLs to the script:

```bash
./script.sh masscan <file>

or

echo <URLs> | ./script.sh masscan
```

# Requirements

The script requires `curl` to be installed on the system.

# Disclaimer

This script is for educational purposes only and should not be used for malicious purposes. The user is solely responsible for any actions taken with the script.
File Snapshot

[4.0K] /data/pocs/1e88e61078955dfb2e86e6d75cb0fb0858bec5a2 ├── [1.2K] README.md └── [2.6K] script.sh 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.