No project description provided
Project description
About the Tool ⚒️
cpanel_xss_2023
is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel.
Features ⚙️
- CVE-2023-29489 Scanning: Identifies and scans for the CVE-2023-29489 vulnerability.
- URL Input: Supports scanning a single URL or reading multiple URLs from a file.
- Output Logging: Allows users to write the scan results to an output file.
- Telegram Notification: Option to create Telegram notifications for scan results.
Prerequisites 🧩
Before using cpanel_xss_2023
, make sure you have the following prerequisites installed:
-
Python 3.x: Ensure you have Python 3.x installed on your system.
-
Required Python Packages:
-
Click: Install the
click
library using the following command:pip install click
-
Requests: Install the
requests
library using the following command:pip install requests
-
PyYAML: Install the
PyYAML
library using the following command:pip install PyYAML
-
-
Telegram Notification (Optional):
If you plan to use the Telegram notification feature, you'll need to set up a Telegram bot and obtain your chat ID. Follow these steps:
- Create a Telegram bot using the BotFather.
- Obtain your chat ID using the get_id_bot.
Usage 🚀
cpanel_xss_2023 -u https://example.com
cpanel_xss_2023 -i urls.txt -o results.txt
cpanel_xss_2023 -u https://example.com -c your_telegram_chat_id
Help Menu ❓
-
u, --url:
Specify the URL to scan for the CVE-2023-29489 vulnerability. Example: cpanel_xss_2023 -u https://target.com -
i, --input:
Read input URLs from a file. Example: cpanel_xss_2023 -i target.txt -
o, --output:
Write scan results to an output file. Example: cpanel_xss_2023 -i target.txt -o output.txt -
c, --chatid:
Create Telegram notifications for scan results. Example: cpanel_xss_2023 --chatid your_telegram_chat_id -
h, --help:
Display the help menu.
Disclaimer ⚠️
This script is intended for educational and ethical purposes only. Unauthorized use of this script to perform malicious activities is strictly prohibited. The developers are not responsible for any misuse or damage caused by this script.
Version History 🕒
v1.0
: Find CVE-2023-29489 in cpanel
v1.1
: Find whether the endpoint is exploitable or not
Profile Views 👁️
License 🪪
Author 👤
Connect at 💬
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for cpanel_xss_2023-1.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1cd0ff839ac0d9e1e057d3287c26c285748fe541d3e126b6518ba0e26564811d |
|
MD5 | b9cf49bfb4cd7f967d4b17262999d08c |
|
BLAKE2b-256 | 015bb039144e151d822ec954a6fb70997aa7130261c8acbaad7aaaeab7589b45 |