67

GitHub - Frint0/mass-pwn-vbulletin: Identify vulnerable (RCE) vBulletin 5.0.0 -...

 4 years ago
source link: https://github.com/Frint0/mass-pwn-vbulletin
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

README.md

Mass-Pwn-vBulletin

Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)

Bulletin

Demo

Requirements:

  • Python >= 3.5.3
  • asyncio >= 3.4.3
  • aiohttp >= 3.6.1
  • ipaddress
  • termcolor >= 1.1.0
  • tqdm >= 4.36
  • pyfiglet
  • click >= 7.0
  • IPy >= 1.0

Gathering Hosts:

This tool iterates over vBulletin hosts on port 443 and 80 asynchronously and runs a PoC to test if they are vulnerable to CVE-2019-16759. You can use Shodan to gather potential targets:

shodan download vbullet-443 'html:"vbulletin" port:443'
shodan parse vbullet-443.json.gz --fields ip_str > vbullet-443
shodan download vbullet-80 'html:"vbulletin" port:80'
shodan parse vbullet-80.json.gz --fields ip_str > vbullet-80

Special Thanks:

Thanks to the anonymous user who published this 0day over at https://seclists.org/fulldisclosure/2019/Sep/31

Disclaimer:

I am not responsible for what you do with this tool, this is simply for research purposes.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK