Skip to main content

No project description provided

Project description

nnkrxx

Overview

This is the tool through which we can check whether the given url is vulnerable to CVE-2023-29489

CVE-2023-29489

CVE-2023-29489 is a reflected cross-site scripting (XSS) vulnerability found in cPanel, a web hosting control panel software that is widely deployed across the internet. This vulnerability can be exploited without any authentication, and it is exploitable regardless of whether or not the cPanel management ports are exposed externally. This means that websites managed by cPanel on ports 80 and 443 are also vulnerable to the XSS attack.

The XSS vulnerability is due to the lack of sanitization of the message_html variable in the Cpanel::Server::Handlers::Httpd::ErrorPage module. This vulnerability can be exploited by sending a request to any of the cPanel management ports (2080, 2082, 2083, 2086) with a specially crafted URL that contains a malicious script. When the cPanel server responds to the request, it will include the malicious script in the response, which will then be executed by the user's web browser.

The impact of this vulnerability is that an attacker can execute arbitrary JavaScript code in the user's browser, potentially leading to the hijacking of a legitimate user's cPanel session. Once an attacker has gained access to a cPanel session, they can upload a web shell and gain command execution on the server.

The vulnerability has been assigned a CVSS v3 score of 6.1, indicating that it is a medium-severity vulnerability. The probability of exploitation activity in the next 30 days is estimated to be 0.23%, and the EPSS score is around 61%.

The vulnerability has been fixed in cPanel versions 11.102.0.31, 11.106.0.18, 11.108.0.13, and 11.109.9999.116. Users of cPanel are advised to upgrade to one of these versions to mitigate the vulnerability. Additionally, users can enable cPanel's auto-update functionality to ensure that their installation is always up-to-date with the latest security patches.

Requirements

python

pip installations:

pip install BeautifulSoup4
pip install shodan
pip install pystyle

Usage

nnkrxx

run this in your terminal and after running the tool it will automatically ask you to enter the url which you want to redirect to and also the url file list which contains the list of all the urls which we will look for the vulnerability

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

nnkrxx-0.1.tar.gz (3.4 kB view details)

Uploaded Source

Built Distribution

nnkrxx-0.1-py3-none-any.whl (3.8 kB view details)

Uploaded Python 3

File details

Details for the file nnkrxx-0.1.tar.gz.

File metadata

  • Download URL: nnkrxx-0.1.tar.gz
  • Upload date:
  • Size: 3.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.6

File hashes

Hashes for nnkrxx-0.1.tar.gz
Algorithm Hash digest
SHA256 e25ee7b52687fe45591d6f22a556a9486dbf1ddc2c4076b6c39ae82825edaa33
MD5 5085f8061fa77122602d60e0886844ec
BLAKE2b-256 8bfc63d8c748aa0cb22b71aebecefa247da6575b787af9d2f38df1ba61f1622f

See more details on using hashes here.

File details

Details for the file nnkrxx-0.1-py3-none-any.whl.

File metadata

  • Download URL: nnkrxx-0.1-py3-none-any.whl
  • Upload date:
  • Size: 3.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.6

File hashes

Hashes for nnkrxx-0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4dd5d5c95b0f976a1203f5c61aaaab80b165ad54e30ac9969704d3c5d172e0a4
MD5 5da3cc51a3e3bb56ab2a444eb69f00b8
BLAKE2b-256 28ff3831bd10be7ada631424050a639cbf10306ce8e2de9313e0c0f819a8b5b9

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page