A prototype PoC for the automation of vulnerability analysis on targets running CData applications on an embedded Jetty server.
Just use -u
or --url
to specify your target, the script will attempt to retrieve the getSettings.rsb?
file, present within all CData instances.
More error handling to be added in future
Please use responsibly, exploitability is extremely high with this vulnerability. Only test within your own authorised limitations.