A Python script to scan websites for the CVE-2024-51378 vulnerability.# CVE-2024-51378 Vulnerability Scanner

A Python script to scan websites for the CVE-2024-51378 vulnerability.
## Features
- Identifies vulnerable sites based on CSRF tokens and custom endpoints.
- Highlights results as `[GOOD]` or `[SAFE]` with color-coded outputs.
- Logs detailed scan results to a file.
- Displays ASCII art with project details.
## Requirements
- Python 3.6+
- Required libraries:
- `httpx`
- `pyfiglet`
## Installation
1. Clone the repository:
git clone https://github.com/i0x29A/CVE-2024-51378.git
cd CVE-2024-51378
2. Install dependencies:
pip install -r requirements.txt
## Usage
1. Prepare a file containing URLs to scan (one per line).
2. Run the script:
python3 scanner.py <file> <output>
- `<file>`: Path to the file with URLs.
- `<output>`: Path to save the log file.
### Example
File `targets.txt`:
http://example.com
http://testsite.org
Run the scanner:
python3 scanner.py targets.txt results.log
## Notes
- Use responsibly! This tool is for educational and testing purposes only.
- Ensure compliance with all applicable laws and policies when using the scanner.
## License
This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.
## Authors
- [@Luka Petrovic](https://github.com/refr4g)
- [@cr4shed](https://github.com/i0x29A)
[4.0K] /data/pocs/fffdce51365432fc7348ca46bfb58ae6e23515c8
├── [3.2K] CVE-2024-51378.py
├── [1.0K] LICENSE
├── [1.3K] README.md
└── [ 15] requirements.txt
0 directories, 4 files