/web-cve-tests

A simple framework for sending test payloads for known web CVEs.

Primary LanguagePython

web-cve-tests

The goal of this tool is to send PoC payloads to verify server side attack detection solutions. If detected, the server side should return a specifed HTTP status code.

This tool is not intended to actually exploit the vulnearility or to test for the existance of the vulnerability.

Usage

Basic:

./webcve.py -url https://target-site.com

Specify detected response code (default is 403):

./webcve.py -url https://target-site.com -code 406

Verbose (output CVE descriptions):

./webcve.py -url https://target-site.com -v

Test a single CVE (with example output):

./webcve.py -url https://target-site.com -code 406 -cve CVE-2017-9791 -v
CVE-2017-9791
The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution
via a malicious field value passed in a raw message to the ActionMessage.
        Test passed (406)
        Test passed (406)
        Test passed (406)
        Test passed (406)

Contributions

Pull requests are welcome. Please use the existing CVE directories as examples of how you should structure your submission.