menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right Middleware-Vulnerability-detection-master chevron_right Jboss chevron_right jexboss chevron_right jexcsv.py
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    jexcsv.py
    2 KB / 2021-07-12 19:46:00
        """
    Check URLs for JBoss vulnerabilities in bulk and output results to a CSV file
    
    Copyright 2016 Sean Whalen
    
    Licensed under the Apache License, Version 2.0 (the "License");
    you may not use this file except in compliance with the License.
    You may obtain a copy of the License at
    
        http://www.apache.org/licenses/LICENSE-2.0
    
    Unless required by applicable law or agreed to in writing, software
    distributed under the License is distributed on an "AS IS" BASIS,
    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    See the License for the specific language governing permissions and
    limitations under the License.
    """
    
    from argparse import ArgumentParser
    from csv import DictWriter
    
    from jexboss import check_vul
    
    __version__ = "1.0.0"
    __author__ = "Sean Whalen - @SeanTheGeek"
    
    args = ArgumentParser(description=__doc__)
    args.add_argument("input", help="Path to the input file")
    args.add_argument("output", help="Path to the output file")
    args = args.parse_args()
    
    paths = {"jmx-console": "/jmx-console/HtmlAdaptor?action=inspectMBean&name=jboss.system:type=ServerInfo",
             "web-console" 		: "/web-console/ServerInfo.jsp",
             "JMXInvokerServlet": "/invoker/JMXInvokerServlet"}
    
    results = []
    
    with open(args.input, "r") as input_file:
        urls = input_file.readlines()
    
    
    for url in urls:
        if url == "":
            continue
        if not url.startswith("http"):
            url = "http://{0}".format(url)
        url = url.strip()
        if url.endswith("/"):
            url = url[:-1]
    
        url_results = check_vul(url)
        for key in url_results.keys():
            if url_results[key] == 200 or url_results[key] == 500:
                full_url = "{0}{1}".format(url, paths[key])
                result = dict(base_url=url, vulnerability=key, full_url=full_url, status_code=url_results[key])
                results.append(result)
    
    fields = ["base_url", "vulnerability", "full_url", "status_code"]
    with open(args.output, "w") as output_file:
        writer = DictWriter(output_file, fields)
        writer.writeheader()
        writer.writerows(results)
    
    
    links
    file_download