Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jul10l1r4/identificador-cve-2018-11759
This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer
https://github.com/jul10l1r4/identificador-cve-2018-11759
apache2 cve cve-2018-11759 load-balancer module protection safe security security-testing
Last synced: about 6 hours ago
JSON representation
This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer
- Host: GitHub
- URL: https://github.com/jul10l1r4/identificador-cve-2018-11759
- Owner: Jul10l1r4
- License: gpl-3.0
- Created: 2018-12-08T02:32:14.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2019-01-21T20:03:22.000Z (almost 6 years ago)
- Last Synced: 2023-10-20T20:52:17.233Z (about 1 year ago)
- Topics: apache2, cve, cve-2018-11759, load-balancer, module, protection, safe, security, security-testing
- Language: Shell
- Homepage: https://jul10l1r4.github.io/artigo/Vulnerabilidade-em-balanceadores-mod_jk-[CVE-2018-11759]/index.html
- Size: 52.7 KB
- Stars: 5
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
- License: LICENSE
Awesome Lists containing this project
README
> Other language [git](https://notabug.org/Jul10l1r4/Identificador-CVE-2018-11759) - pt-BR
# Check if your instances are expose the CVE 2018-11759
The archive `main` are a script in bash for exploiting.
> The urls shall use the protocol and complete addres, example: https://test.site.com.br[![asciicast](https://asciinema.org/a/222760.svg)](https://asciinema.org/a/222760)
For more urls in one consult, can be used the here-document, example:
```bash
# Call the bash, no request permission for exec
bash main << EOF
https://vulpagepagevul.com
http://pamonhaemandioca.gov.br
https://youtube.com
# ...
EOF
```
If no want use the here-document, he can be open with `bash main`# Audit
To facilitate the audit report a file is created in `files_cap/` with name of target.data that have all details of target load balancer, with internal address, ports, timestemp, distros, routes, etc.# License
This exploit is free, GNU GPL version 3This project created by @jul10l1r4 are part of Segmentation fault