Share
## https://sploitus.com/exploit?id=6E7CDCCE-662B-5A31-A8DA-C2A016E8A8BE
# #CVE-2023-29923
1、准备一个url.txt,例如:
<img width="745" alt="image" src="https://github.com/1820112015/CVE-2023-29923/blob/6345c95d8e46be1653feec6860741662fe8e75e9/images/b67dfbeb-1b30-4d77-815d-c0aade854517.png">
2、执行 `python CVE-2023-29923.py -f url.txt`
<img width="745" alt="image" src="https://github.com/1820112015/CVE-2023-29923/blob/6345c95d8e46be1653feec6860741662fe8e75e9/images/8424b5a0-7815-4973-bf7d-e6e0f2632cd2.png">
<img width="745" alt="image" src="https://github.com/1820112015/CVE-2023-29923/blob/6345c95d8e46be1653feec6860741662fe8e75e9/images/2e359fde-08ef-47ef-ad89-ee022d7de180.png">
3、检测出有未授权访问漏洞的资产都会保存在同目录result.txt 文件中
<img width="745" alt="image" src="https://github.com/1820112015/CVE-2023-29923/blob/6345c95d8e46be1653feec6860741662fe8e75e9/images/2ebc74de-3f9c-4614-8ccf-e8f67336fb37.png">