No project description provided
Project description
nnkrxx
Overview
This is the tool through which we can check whether the given url is vulnerable to CVE-2023-29489
CVE-2023-29489
CVE-2023-29489 is a reflected cross-site scripting (XSS) vulnerability found in cPanel, a web hosting control panel software that is widely deployed across the internet. This vulnerability can be exploited without any authentication, and it is exploitable regardless of whether or not the cPanel management ports are exposed externally. This means that websites managed by cPanel on ports 80 and 443 are also vulnerable to the XSS attack.
The XSS vulnerability is due to the lack of sanitization of the message_html variable in the Cpanel::Server::Handlers::Httpd::ErrorPage module. This vulnerability can be exploited by sending a request to any of the cPanel management ports (2080, 2082, 2083, 2086) with a specially crafted URL that contains a malicious script. When the cPanel server responds to the request, it will include the malicious script in the response, which will then be executed by the user's web browser.
The impact of this vulnerability is that an attacker can execute arbitrary JavaScript code in the user's browser, potentially leading to the hijacking of a legitimate user's cPanel session. Once an attacker has gained access to a cPanel session, they can upload a web shell and gain command execution on the server.
The vulnerability has been assigned a CVSS v3 score of 6.1, indicating that it is a medium-severity vulnerability. The probability of exploitation activity in the next 30 days is estimated to be 0.23%, and the EPSS score is around 61%.
The vulnerability has been fixed in cPanel versions 11.102.0.31, 11.106.0.18, 11.108.0.13, and 11.109.9999.116. Users of cPanel are advised to upgrade to one of these versions to mitigate the vulnerability. Additionally, users can enable cPanel's auto-update functionality to ensure that their installation is always up-to-date with the latest security patches.
Requirements
python
pip installations:
pip install BeautifulSoup4
pip install shodan
pip install pystyle
Usage
nnkrxx
run this in your terminal and after running the tool it will automatically ask you to enter the url which you want to redirect to and also the url file list which contains the list of all the urls which we will look for the vulnerability
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file nnkrxx-0.1.tar.gz
.
File metadata
- Download URL: nnkrxx-0.1.tar.gz
- Upload date:
- Size: 3.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e25ee7b52687fe45591d6f22a556a9486dbf1ddc2c4076b6c39ae82825edaa33 |
|
MD5 | 5085f8061fa77122602d60e0886844ec |
|
BLAKE2b-256 | 8bfc63d8c748aa0cb22b71aebecefa247da6575b787af9d2f38df1ba61f1622f |
File details
Details for the file nnkrxx-0.1-py3-none-any.whl
.
File metadata
- Download URL: nnkrxx-0.1-py3-none-any.whl
- Upload date:
- Size: 3.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 4dd5d5c95b0f976a1203f5c61aaaab80b165ad54e30ac9969704d3c5d172e0a4 |
|
MD5 | 5da3cc51a3e3bb56ab2a444eb69f00b8 |
|
BLAKE2b-256 | 28ff3831bd10be7ada631424050a639cbf10306ce8e2de9313e0c0f819a8b5b9 |