No project description provided
Project description
About the Tool ⚒️
cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel.
Features ⚙️
- CVE-2023-29489 Scanning: Identifies and scans for the CVE-2023-29489 vulnerability.
- URL Input: Supports scanning a single URL or reading multiple URLs from a file.
- Output Logging: Allows users to write the scan results to an output file.
- Telegram Notification: Option to create Telegram notifications for scan results.
Prerequisites 🧩
Before using cpanel_xss_2023, make sure you have the following prerequisites installed:
-
Python 3.x: Ensure you have Python 3.x installed on your system.
-
Required Python Packages:
-
Click: Install the
clicklibrary using the following command:pip install click
-
Requests: Install the
requestslibrary using the following command:pip install requests
-
PyYAML: Install the
PyYAMLlibrary using the following command:pip install PyYAML
-
-
Telegram Notification (Optional):
If you plan to use the Telegram notification feature, you'll need to set up a Telegram bot and obtain your chat ID. Follow these steps:
- Create a Telegram bot using the BotFather.
- Obtain your chat ID using the get_id_bot.
Usage 🚀
cpanel_xss_2023 -u https://example.com
cpanel_xss_2023 -i urls.txt -o results.txt
cpanel_xss_2023 -u https://example.com -c your_telegram_chat_id
Help Menu ❓
-
u, --url:Specify the URL to scan for the CVE-2023-29489 vulnerability. Example: cpanel_xss_2023 -u https://target.com -
i, --input:Read input URLs from a file. Example: cpanel_xss_2023 -i target.txt -
o, --output:Write scan results to an output file. Example: cpanel_xss_2023 -i target.txt -o output.txt -
c, --chatid:Create Telegram notifications for scan results. Example: cpanel_xss_2023 --chatid your_telegram_chat_id -
h, --help:Display the help menu.
Disclaimer ⚠️
This script is intended for educational and ethical purposes only. Unauthorized use of this script to perform malicious activities is strictly prohibited. The developers are not responsible for any misuse or damage caused by this script.
Version History 🕒
v1.0: Find CVE-2023-29489 in cpanel
v1.1: Find whether the endpoint is exploitable or not
Profile Views 👁️
License 🪪
Author 👤
Connect at 💬
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cpanel_xss_2023-1.1.tar.gz.
File metadata
- Download URL: cpanel_xss_2023-1.1.tar.gz
- Upload date:
- Size: 7.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
286628223f0caf36afafd4cfb20bbeeb5fb30afc98d2a8748c6f70463efffd66
|
|
| MD5 |
f1b8f345d90a51cef3faceda91a7f4e1
|
|
| BLAKE2b-256 |
d94b3aa741f4ff5d386e0cfef1d503ed6b7e4d7aaf3006e2560b693801861600
|
File details
Details for the file cpanel_xss_2023-1.1-py3-none-any.whl.
File metadata
- Download URL: cpanel_xss_2023-1.1-py3-none-any.whl
- Upload date:
- Size: 9.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1cd0ff839ac0d9e1e057d3287c26c285748fe541d3e126b6518ba0e26564811d
|
|
| MD5 |
b9cf49bfb4cd7f967d4b17262999d08c
|
|
| BLAKE2b-256 |
015bb039144e151d822ec954a6fb70997aa7130261c8acbaad7aaaeab7589b45
|