## https://sploitus.com/exploit?id=639C0CE3-FD0D-56F1-BEAC-2501EA0A8516
# CVE-2023-34598 - Gibbon v25.0.0 LFI Exploit
This repository contains a Python script that helps identify and exploit a local file inclusion (LFI) vulnerability (CVE-2023-34598) in **Gibbon v25.0.0**. The script can scan a target website for potential vulnerability and, if successful, download the SQL dump for further analysis. It also provides a built-in FOFA query to help locate potentially vulnerable targets.
## Overview
- **Name:** `CVE-2023-34598.py`
- **Purpose:** Identify and exploit a Local File Inclusion (LFI) vulnerability in Gibbon v25.0.0.
- **Primary Features:**
- **Scan a single target** for vulnerability.
- **Extract partial database dumps** if the target is vulnerable.
- **Optionally display** a FOFA query to find more targets.
> **Warning**: This script is intended for educational purposes and authorized penetration testing. Unauthorized use against websites or servers may be illegal and is strictly discouraged. Always obtain proper permission before testing.
---
## Requirements
- **Python 3.x** (Recommended 3.6+)
- **Requests library** (`pip install requests`)
---
## Setup & Installation
1. **Clone** or **download** this repository.
2. Ensure that you have Python 3 installed.
3. Install the required Python libraries:
```bash
pip install requests
```
---
## Usage
### 1. Display Help
Run the script without arguments or use the `-h`/`--help` option:
```bash
python3 CVE-2023-34598.py -h
```
This will display an overview of all available commands and options.
### 2. FOFA Query
To display the FOFA query that helps locate potentially vulnerable targets, use:
```bash
python3 CVE-2023-34598.py fofa
```
Copy the displayed query and use it in FOFA to find target URLs.
### 3. Scanning a Single Target
To scan a specific target URL, run:
```bash
python3 CVE-2023-34598.py scan https://example.com/gibbon
```
Replace `https://example.com/gibbon` with the base URL of your Gibbon installation.
The script will:
1. **Check** the target for vulnerability by requesting `?q=gibbon.sql`.
2. **Identify** if the page contains a specific marker (`"SQL Dump"`).
3. **Create** a new output directory (`Gibbon_dump`, or `Gibbon_dump-2` if the directory already exists, etc.).
4. **Save** the partial SQL dump (if found) into a file named `gibbon.sql` inside the newly created directory.
---
## Script Behavior
1. **Directory Creation**
- A directory named `Gibbon_dump` is created if the target is found vulnerable, and the script stores results there.
- If `Gibbon_dump` already exists, the script creates a new directory named `Gibbon_dump-2`, `Gibbon_dump-3`, etc.
2. **File Outputs**
- **`!target.txt`**: Contains the scanned target’s base URL.
- **`gibbon.sql`**: Contains the extracted SQL dump if markers are found.
3. **Error Handling**
- If any network or unexpected error occurs, the script will display an error message and exit.
---
## Example Workflows
### Basic Scan & Dump
1. **Scan & Dump**:
```bash
python3 CVE-2023-34598.py scan https://victim.com/gibbon
```
2. If vulnerable, the script creates a folder (e.g., `Gibbon_dump`) and saves `!target.txt` and `gibbon.sql`.
### FOFA Query
1. **Display FOFA**:
```bash
python3 CVE-2023-34598.py fofa
```
2. Copy and paste the returned query into FOFA to find a list of targets.
---
## Notes & Disclaimers
- **Legal Usage**: Use this script only on systems you own or have explicit permission to test.
- **Disclaimer**: The authors assume **no responsibility** for misuse or damage caused by this tool.
- **For Education Only**: This script is intended to demonstrate exploitation techniques for educational and research purposes.
---
## Credit
Credit to [ @komodoooo](https://gist.github.com/komodoooo/bf9bfea7f229d503e91d108940cf5ec0), this is just a python fork of his ruby repository.