Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-25157 PoC — GeoServer SQL注入漏洞

Source
Associated Vulnerability
Title:GeoServer SQL注入漏洞 (CVE-2023-25157)
Description:GeoServer是一个用 Java 编写的开源软件服务器。允许用户共享和编辑地理空间数据。 GeoServer 2.21.4之前、2.22.2之前版本存在安全漏洞,该漏洞源于 ``strEndsWith``、``strStartsWith`` 和 ``PropertyIsLike `` 存在滥用 问题。
Readme
# CVE-2023-25157
This is a simple Python Script to Find the Latest GeoServer SQL Injection Vulnerability. You can use the Scripts on hosts to check for infected path.

# Installation:
1. git clone https://github.com/0x2458bughunt/CVE-2023-25157/
2. cd CVE-2023-25157
3. chmod +x geoserver.sh

Note: You should have all the files on same directory, in case you want to use the files from anywhere throughout your system, follow these steps:
1. Open geoserver.sh and change GeoServerPath-Finder.py with it's full path. (Eg- /root/CVE-2023-25157/GeoServerPath-Finder.py)
2. Do the same with GeoServer_Keyword-Checker.py.
3. copy geoserver.sh to /usr/bin.
Now you can access it from anywhere around your system! :D


#Usage:
./geoserver.sh /path/to/hosts/file/

If it finds the directory It'll Respong with "Directory Found" follwing with full URL.
![image](https://github.com/0x2458bughunt/CVE-2023-25157/assets/134130770/eeeeadcb-a102-4f3a-bea2-e451330f6ebb)

Else It'll give output as "Directory Not Found"
![image](https://github.com/0x2458bughunt/CVE-2023-25157/assets/134130770/fdc0bc52-f432-45d0-b6a8-3e9a51283269)

Then It'll check for the specific keyword to verify if the URL really has GeoServer directory open or not. This process has been added to avoid false positives.
If found It'll give output in final_output.txt as "Keyword Found on https://website123.com/"
If the keyword dosen't match, It'll give output as: "Keyword not Found on https://website123.com/"


Hope you like this! This is my first every Github Project! 
If you wanna show love to this, leave a star and follow my socials!
Twitter: https://twitter.com/0x2458
BuyMeACoffee: https://buymeacoffee.com/0x2458/
File Snapshot

[4.0K] /data/pocs/fcf3a744b696ecab23d9823883b2a6df33ec84ce ├── [1.0K] GeoServer_Keyword-Checker.py ├── [1.7K] GeoServer_Path-Finder.py ├── [ 394] geoserver.sh ├── [1.0K] LICENSE └── [1.6K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.