* v9.0 - Added CVE-2020-17519 - Apache Flink Path Traversal sc0pe template * v9.0 - Added RabbitMQ Management Interface Detected sc0pe template * v9.0 - Added CVE-2020-29583 Zyxel SSH Hardcoded Credentials via BruteX * v9.0 - Removed vulnscan NMap CSV updates/downloads to save space/bandwidth * v9.0 - Added Nuclei sc0pe parser * v9.0 - Added Nuclei vulnerability scanner * v9.0 - Added Wordpress WPScan sc0pe vulnerability parser * v9.0 - Fixed issue with wrong WPscan API key command * v9.0 - Added CVE-2020-11738 - WordPress Duplicator plugin Directory Traversal sc0pe template * v9.0 - Renamed AUTO_VULNSCAN setting to "VULNSCAN" in sniper.conf to perform vulnerability scans via 'normal' mode
15 lines
495 B
Python
15 lines
495 B
Python
# Import any WebDriver class that you would usually import from
|
|
# selenium.webdriver from the seleniumrequests module
|
|
import sys
|
|
from seleniumrequests import Firefox
|
|
|
|
url = sys.argv[1]
|
|
# Simple usage with built-in WebDrivers:
|
|
webdriver = Firefox()
|
|
response = webdriver.request('GET', '%s/xss.php?xss=<script>document.write(INJECTX)</script>' % url)
|
|
if '<script>document.write(INJECTX)</script>' in response.text:
|
|
print("Vulnerable!")
|
|
print(response.text)
|
|
webdriver.quit()
|
|
SECONDARY_COMMANDS=''
|