Skip to main content

No project description provided

Project description

About the Tool ⚒️

cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel.

Features ⚙️

  • CVE-2023-29489 Scanning: Identifies and scans for the CVE-2023-29489 vulnerability.
  • URL Input: Supports scanning a single URL or reading multiple URLs from a file.
  • Output Logging: Allows users to write the scan results to an output file.
  • Telegram Notification: Option to create Telegram notifications for scan results.

Prerequisites 🧩

Before using cpanel_xss_2023, make sure you have the following prerequisites installed:

  1. Python 3.x: Ensure you have Python 3.x installed on your system.

  2. Required Python Packages:

    • Click: Install the click library using the following command:

      pip install click
      
    • Requests: Install the requests library using the following command:

      pip install requests
      
    • PyYAML: Install the PyYAML library using the following command:

      pip install PyYAML
      
  3. Telegram Notification (Optional):

    If you plan to use the Telegram notification feature, you'll need to set up a Telegram bot and obtain your chat ID. Follow these steps:

Usage 🚀

cpanel_xss_2023 -u https://example.com
cpanel_xss_2023 -i urls.txt -o results.txt
cpanel_xss_2023 -u https://example.com -c your_telegram_chat_id

Help Menu ❓

  • u, --url: Specify the URL to scan for the CVE-2023-29489 vulnerability. Example: cpanel_xss_2023 -u https://target.com

  • i, --input: Read input URLs from a file. Example: cpanel_xss_2023 -i target.txt

  • o, --output: Write scan results to an output file. Example: cpanel_xss_2023 -i target.txt -o output.txt

  • c, --chatid: Create Telegram notifications for scan results. Example: cpanel_xss_2023 --chatid your_telegram_chat_id

  • h, --help: Display the help menu.

Disclaimer ⚠️

This script is intended for educational and ethical purposes only. Unauthorized use of this script to perform malicious activities is strictly prohibited. The developers are not responsible for any misuse or damage caused by this script.

Version History 🕒

v1.0: Find CVE-2023-29489 in cpanel v1.1: Find whether the endpoint is exploitable or not

Profile Views 👁️

License 🪪

MIT License

Author 👤

@mdaseem03

Connect at 💬

cyberspartan karthithehacker

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cpanel_xss_2023-1.1.tar.gz (7.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cpanel_xss_2023-1.1-py3-none-any.whl (9.3 kB view details)

Uploaded Python 3

File details

Details for the file cpanel_xss_2023-1.1.tar.gz.

File metadata

  • Download URL: cpanel_xss_2023-1.1.tar.gz
  • Upload date:
  • Size: 7.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.6

File hashes

Hashes for cpanel_xss_2023-1.1.tar.gz
Algorithm Hash digest
SHA256 286628223f0caf36afafd4cfb20bbeeb5fb30afc98d2a8748c6f70463efffd66
MD5 f1b8f345d90a51cef3faceda91a7f4e1
BLAKE2b-256 d94b3aa741f4ff5d386e0cfef1d503ed6b7e4d7aaf3006e2560b693801861600

See more details on using hashes here.

File details

Details for the file cpanel_xss_2023-1.1-py3-none-any.whl.

File metadata

  • Download URL: cpanel_xss_2023-1.1-py3-none-any.whl
  • Upload date:
  • Size: 9.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.6

File hashes

Hashes for cpanel_xss_2023-1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 1cd0ff839ac0d9e1e057d3287c26c285748fe541d3e126b6518ba0e26564811d
MD5 b9cf49bfb4cd7f967d4b17262999d08c
BLAKE2b-256 015bb039144e151d822ec954a6fb70997aa7130261c8acbaad7aaaeab7589b45

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page