Skip to content

A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166

License

Notifications You must be signed in to change notification settings

Andrysqui/CVE-2024-9166

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-9166 Vulnerability Scanner

A Python-based tool to scan websites for the CVE-2024-9166 vulnerability, which is one of the most recent ones (at the moment of publishing this repository.). It checks for vulnerable patterns, tests the vulnerability to confirm it, and logs results to a file.

I'm not responsible in any way of the misuse of this tool. This tool was made with the intention of being used for ethical hacking, doing penetration testing (and every type of hacking) without consent is illegal and can have serious consequences!

Installation

To install the tool you can just copy this Github repository with this single command:

git clone https://github.com/Andrysqui/CVE-2024-9166

Requirements

  • Python 3.7+
  • Install Python dependencies via pip:
pip install requests beautifulsoup4 argparse

Usage

Basic Usage:

  1. Single URL Scan:
  python3 CVE-2024-9166.py --url https://example.com
  1. Scan Multiple URLs from a File and Logging the Results:
  python3 CVE-2024-9166.py --file urls.txt --logfile output.log
  1. Custom Headers
  python3 CVE-2024-9166.py --url https://example.com --headers '{"User-Agent": "Custom-Agent", "Bug-Bounty: True", "Pen-Testing: True"}'

Command-Line Arguments:

  • -h or --help: Shows a help message explaining each one of the arguments below.
  • --url or -u: Specify a single URL to scan (mutually exclusive with -f or --file).
  • --file or -f: Path with a file with URLs to scan (one per line, mutually exclusive with -u or --url).
  • --logfile or -l: Path to log results (default: scan_log.txt).
  • --headers: Custom headers in JSON format (e.g., '{"User-Agent": "Custom-Agent"}').
  • --threads: Number of threads for scanning multiple URLs (default: 5).
  • --exploit-command: Command used to test the vulnerability (default: id).
  • --vulnerable-content: Pattern to search for inside responses to confirm a vulnerability when using custom command (default: uid=).

About

A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages