Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-44877 PoC — CentOS Web Panel 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:CentOS Web Panel 操作系统命令注入漏洞 (CVE-2022-44877)
Description:login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
Description
Bash Script for Checking Command Injection Vulnerability  on CentOS Web Panel [CWP] (CVE-2022-44877)
Readme
# CVE-2022-44877 

## Overview

This bash script is used to test the vulnerability of web servers to CVE-2022-44877. The script performs a curl request to a target URL with a payload encoded in base64. If the target is vulnerable to the CVE-2022-44877 vulnerability, the elapsed time of the curl request will be greater than 3.5 seconds.


## Installation

```bash
sudo apt-get update
sudo apt-get install curl bc
git clone https://github.com/Chocapikk/CVE-2022-44877
cd CVE-2022-44877
chmod +x script.sh
```

## Usage

The script can be used in three different ways:

`scan`: To scan a single URL, run the following command:

```bash
./script.sh scan <URL>
```

`exploit`: To exploit a single URL, run the following command:

```bash
./script.sh exploit <URL> <payload>
```

`masscan`: To scan a list of URLs, either provide a file containing the list of URLs or pipe the list of URLs to the script:

```bash
./script.sh masscan <file>

or

echo <URLs> | ./script.sh masscan
```

# Requirements

The script requires `curl` to be installed on the system.

# Disclaimer

This script is for educational purposes only and should not be used for malicious purposes. The user is solely responsible for any actions taken with the script.
File Snapshot

[4.0K] /data/pocs/d7f2fb588dd6bf342608b16c40bf71facc2ea16a ├── [1.2K] README.md └── [2.6K] script.sh 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →