关联漏洞
介绍
<h1 align="center">CVE-2023-29489</h1>
<p align="center">
The security vulnerability is recorded in the Common Vulnerabilities and Exposures (CVE) system. Specifically, this vulnerability is related to cPanel, a popular hosting management software. This flaw allows for cross-site scripting (XSS) attacks through specially crafted requests."
</p>
<h1 align="center">Details about CVE-2023-29489</h1>
<p align="center">
This vulnerability allows attackers to execute malicious JavaScript code in a user's browser 💻 through specially crafted requests sent to the cPanel interface. This can lead to the theft of sensitive information 🔒, such as session cookies, or the performance of unauthorized actions 🚫 on behalf of the user.
Severity ⚠️
According to the Common Vulnerability Scoring System (CVSS) scale, this vulnerability is rated as medium (approximately 5.4/10, depending on implementation).
Affected Versions 🗓️
cPanel versions prior to the patched release (specifically, versions before the security update).
Recommendation 🛡️
Users should update cPanel to the latest version to patch this vulnerability. The cPanel provider has already released a fix to address the issue.
Disclosure Date 📅
The vulnerability was publicly disclosed around April 2023</p>
<h1 align="center">TOOLS EXPLOIT</h1>
<p align="center">
The CVE-2023-29489 Exploit Tool is pretty good... hmm, maybe not as good as some other tools out there, but whatever, it's fine. Its main function is to check websites in bulk for vulnerabilities related to Common Vulnerabilities and Exposures in cPanel, then save the test results. I use Python and leverage colorama and requests in Python to exploit it more powerfully. It adds payloads to test for vulnerabilities ::) yeah, my way of talking is kinda hard to understand, but I don’t care if you get it or not : ) just remember to like my tool, that’s enough, thanks for checking it out.
# VIDEO
https://github.com/user-attachments/assets/29b174f3-5228-4c0f-a139-ed22a7bf9d58

Note: I’m never responsible if you use my tool for illegal activities; it has nothing to do with me.
</p>
<h1 align="center">JOIN THE GROUP</h1>
# TELEGRAM CHANNELS - https://t.me/humanpcc
-
# REDDIT - https://www.reddit.com/user/luckkystopdz/
-
# MAILS - luckkystopdz@gmail.com
文件快照
[4.0K] /data/pocs/a291a13e2f85fee5899856d98dae1f23c5feeb1c
├── [4.9K] CVE-2023-29489.py
├── [2.4K] README.md
└── [ 17K] site.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。