Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31589 PoC — BeyondTrust Remote Support 跨站脚本漏洞

Source
Associated Vulnerability
Title:BeyondTrust Remote Support 跨站脚本漏洞 (CVE-2021-31589)
Description:BeyondTrust Remote Support是美国BeyondTrust公司的一个适用于 Windows、Mac、Linux、Ios(iPad、iPhone)等的远程桌面访问、服务台和协作软件。 BeyondTrust Remote Support 存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
CVE-2021-31589 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.
Readme

![Logo](https://github.com/karthi-the-hacker/CVE-2021-31589/blob/main/Images/logo.gif?raw=true)


## Badges




[![MIT License](https://img.shields.io/badge/License-MIT-green.svg)](https://choosealicense.com/licenses/mit/)
[![Follow Twitter](https://img.shields.io/twitter/follow/karthithehacker?style=social)](https://twitter.com/karthithehacker)


## License

[MIT](https://choosealicense.com/licenses/mit/)


## Installation

Install cve-2021-31589 with npm

```bash
  npm install cve-2021-31589 -g
```



## Usage

Example for single url

```bash
  cve-2021-31589 -u http://example.com 
```

## Usage

Example for list of urls 

```bash
  cve-2021-31589 -l urls.txt -o out.txt
```


## Screenshots

![App Screenshot](https://github.com/karthi-the-hacker/CVE-2021-31589/raw/main/Images/example.png)



## Help menu

#### Get all items

```bash
  

👋 Hey karthithehacker 

 .-----------------------------.           
 |  Tool   : CVE-2021-31589 💉 |           
 |  Author : @karthithehacker🎖️|           
 |     ';alert('XSS')//';      |           
 '-----------------------------'           
                 ^      (\_/)    
                 '----- (O.o)    
                        (> <)    

CVE-2021-31589 Scanner 
CVE-2021-31589 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.


$ CVE-2021-31589 [option]
Usage: CVE-2021-31589 [options]

```

| Argument | Type     | Description                |
| :-------- | :------- | :------------------------- |
| `-h` | `--help` | Show help |
| `-V` | `--version` | Show version number  |
| `-u` | `--url` | url to scan for CVE-2021-31589 |
| `-o` | `--output` | Save the results to text file |
| `-l` | `--list` | File containing a list of URLs for CVE-2021-31589 scan. |



## 🔗 Links
[![portfolio](https://img.shields.io/badge/my_portfolio-000?style=for-the-badge&logo=ko-fi&logoColor=white)](https://karthithehacker.com/)
[![linkedin](https://img.shields.io/badge/linkedin-0A66C2?style=for-the-badge&logo=linkedin&logoColor=white)](https://www.linkedin.com/in/karthikeyan--v/)
[![twitter](https://img.shields.io/badge/twitter-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white)](https://twitter.com/karthithehacker)



## Author

- [@karthithehacker](https://github.com/karthi-the-hacker/)



## Feedback

If you have any feedback, please reach out to us at contact@karthithehacker.com

File Snapshot

[4.0K] /data/pocs/28f59d647e0ae79c60dcdf1fe0bbda6d240ae588 ├── [4.0K] Images │   ├── [127K] example.png │   └── [538K] logo.gif ├── [4.0K] includes │   └── [1.4K] scan.js ├── [1.5K] index.js ├── [1.0K] LICENSE ├── [1.1K] package.json ├── [2.4K] README.md └── [4.0K] utils ├── [ 594] filereader.js └── [2.5K] help.js 3 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.