POC详情: 7698bf6a324c36b01e09a93e3796829dc30cd790

来源
关联漏洞
标题: Cpanel 跨站脚本漏洞 (CVE-2023-29489)
描述:Cpanel是美国Cpanel公司的一套基于Web的自动化主机托管平台。该平台主要用于自动化管理网站和服务器。 Cpanel 11.109.9999.116之前版本存在安全漏洞。攻击者利用该漏洞可以执行跨站脚本攻击。
描述
Mass Scaning vulnerability in Cpanel [XSS] 
介绍
![logo](https://raw.githubusercontent.com/mr-sami-x/XSS_1915/main/Picsart_24-08-25_02-48-44-728.png)
[![License](https://img.shields.io/badge/license-MIT-blue.svg)](https://opensource.org/licenses/MIT)
[![Python](https://img.shields.io/badge/python-3.6%2B-blue.svg)](https://www.python.org/downloads/release)
[![GitHub issues](https://img.shields.io/github/issues/0-d3y/Ex-SQLi)](https://github.com/0-d3y/CVE-2023-29489/issues)
[![GitHub stars](https://img.shields.io/github/stars/0-d3y/Ex-SQLi)](https://github.com/0.d3y/CVE-2023-29489/stargazers)


# CVE-2023-29489

Mass Scaning vulnerability in Cpanel [XSS] 
## KALI LINUX

```sudo pip install BeautifulSoup```

```sudo pip install shodan```

```sudo pip install pystyle```

```git clone https://github.com/0-d3y/CVE-2023-29489.git```

```cd CVE-2023-29489```

```python cve_2023_29489.py```

## TERMUX

```pkg install BeautifulSoup```

```pkg instaal shodan ```

```pkg install pystyle```

```pkg install requests```

```git clone https://github.com/0-d3y/CVE-2023-29489.git```

```cd CVE-2023-29489```

```python cve_2023_29489.py```




## Follow me on social media:

[![Twitter](https://img.shields.io/badge/Twitter-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white)](https://twitter.com/Linux_ye)
[![Instagram](https://img.shields.io/badge/Instagram-E4405F?style=for-the-badge&logo=instagram&logoColor=white)](https://www.instagram.com/cyber_77k)
[![YouTube](https://img.shields.io/badge/YouTube-FF0000?style=for-the-badge&logo=youtube&logoColor=white)](https://www.youtube.com/@0.d3y)
[![Telegram](https://img.shields.io/badge/Telegram-2CA5E0?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/i_0d3y)
文件快照

[4.0K] /data/pocs/7698bf6a324c36b01e09a93e3796829dc30cd790 ├── [2.6K] cve_2023_29489.py ├── [288K] Picsart_24-08-25_02-48-44-728.png └── [1.6K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。