Skip to main content

No project description provided

Project description

nnkrxx

Overview

This is the tool through which we can check whether the given url is vulnerable to CVE-2023-29489

CVE-2023-29489

CVE-2023-29489 is a reflected cross-site scripting (XSS) vulnerability found in cPanel, a web hosting control panel software that is widely deployed across the internet. This vulnerability can be exploited without any authentication, and it is exploitable regardless of whether or not the cPanel management ports are exposed externally. This means that websites managed by cPanel on ports 80 and 443 are also vulnerable to the XSS attack.

The XSS vulnerability is due to the lack of sanitization of the message_html variable in the Cpanel::Server::Handlers::Httpd::ErrorPage module. This vulnerability can be exploited by sending a request to any of the cPanel management ports (2080, 2082, 2083, 2086) with a specially crafted URL that contains a malicious script. When the cPanel server responds to the request, it will include the malicious script in the response, which will then be executed by the user's web browser.

The impact of this vulnerability is that an attacker can execute arbitrary JavaScript code in the user's browser, potentially leading to the hijacking of a legitimate user's cPanel session. Once an attacker has gained access to a cPanel session, they can upload a web shell and gain command execution on the server.

The vulnerability has been assigned a CVSS v3 score of 6.1, indicating that it is a medium-severity vulnerability. The probability of exploitation activity in the next 30 days is estimated to be 0.23%, and the EPSS score is around 61%.

The vulnerability has been fixed in cPanel versions 11.102.0.31, 11.106.0.18, 11.108.0.13, and 11.109.9999.116. Users of cPanel are advised to upgrade to one of these versions to mitigate the vulnerability. Additionally, users can enable cPanel's auto-update functionality to ensure that their installation is always up-to-date with the latest security patches.

Requirements

python

pip installations:

pip install BeautifulSoup4
pip install shodan
pip install pystyle

Usage

nnkrxx

run this in your terminal and after running the tool it will automatically ask you to enter the url which you want to redirect to and also the url file list which contains the list of all the urls which we will look for the vulnerability

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

nnkrxx-0.2.tar.gz (3.4 kB view details)

Uploaded Source

Built Distribution

nnkrxx-0.2-py3-none-any.whl (3.8 kB view details)

Uploaded Python 3

File details

Details for the file nnkrxx-0.2.tar.gz.

File metadata

  • Download URL: nnkrxx-0.2.tar.gz
  • Upload date:
  • Size: 3.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.6

File hashes

Hashes for nnkrxx-0.2.tar.gz
Algorithm Hash digest
SHA256 082228ee55c27ea2e5a5d5537454f9f77fe2eba9fb0d9a9e4e2063e34caaa92c
MD5 bd0c07a56d9ac09514e98a36bef60495
BLAKE2b-256 f5736218b14407576fbbf2a2072e286d5c692d62bb0e01748e006874773ef108

See more details on using hashes here.

File details

Details for the file nnkrxx-0.2-py3-none-any.whl.

File metadata

  • Download URL: nnkrxx-0.2-py3-none-any.whl
  • Upload date:
  • Size: 3.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.6

File hashes

Hashes for nnkrxx-0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 c957bee56da6ed36b200f500f95b22b3375c656dd1deed64416921e93ad6a3de
MD5 82e11201b25d5524ba18a420cdfa600e
BLAKE2b-256 d4d33506336b50464d2171f1a1848815f278af345c2ea2d85dfc48b428d859f3

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page