The goal of this tool is to send PoC payloads to verify server side attack detection solutions. If detected, the server side should return a specifed HTTP status code.
This tool is not intended to actually exploit the vulnearility or to test for the existance of the vulnerability.
Basic:
./webcve.py -url https://target-site.com
Specify detected response code (default is 403):
./webcve.py -url https://target-site.com -code 406
Verbose (output CVE descriptions):
./webcve.py -url https://target-site.com -v
Test a single CVE (with example output):
./webcve.py -url https://target-site.com -code 406 -cve CVE-2017-9791 -v
CVE-2017-9791
The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution
via a malicious field value passed in a raw message to the ActionMessage.
Test passed (406)
Test passed (406)
Test passed (406)
Test passed (406)
Pull requests are welcome. Please use the existing CVE directories as examples of how you should structure your submission.