## https://sploitus.com/exploit?id=99199FB5-7F09-5ECB-8223-76B9001F8C0C
# CVE-2024-38856 Apache Ofbiz RCE Scanner
## Description
This script is designed to scan for the `CVE-2024-38856` vulnerability in Apache Ofbiz applications, which may allow for remote code execution. It sends HTTP POST requests to specific paths within the Ofbiz application with malicious payloads to exploit the vulnerability.
![Screenshot_1](https://github.com/user-attachments/assets/2c10ebe1-b173-4ad4-a123-66142d9d7a5c)
## Features
- Scans targets for vulnerability using various paths
- Supports multithreading for faster processing
- Uses `coloredlogs` for color-coded, easy-to-read logs
- Supports input from a file containing a list of targets
## Prerequisites
- Python 3.x
- Python Modules:
- `requests`
- `coloredlogs`
- `colorama`
- `argparse`
- `urllib3`
You can install the required dependencies using pip:
```bash
pip install requests coloredlogs colorama argparse urllib3
```
# Usage
## Running the Script
To run the script, use the following command:
```bash
python script_name.py [options]
```
# Options
- `-t`, `--threads`: Number of threads to use (default: 1)
- `-p`, `--port`: Target port
- `-c`, `--command`: Command to execute
- `-s`, `--scan`: Perform a scan with ping, curl, and wget
- `-d`, `--domain`: Domain (attacker domain) to scan with ping, curl, and wget
- `-f`, `--file`: File containing a list of targets in the format `http(s)://target,port`
# Examples
- Scan targets with a command:
```bash
python script_name.py -f targets.txt -c "whoami"
```
# Perform a scan with a domain:
```bash
python script_name.py -s -d example.com -p 80
```
# Use a file containing a list of targets:
```bash
python script_name.py -f targets.txt -c "uname -a"
```
# Error Handling
- If targets lack the http:// or https:// prefix, the script will prompt you to choose a prefix to add.
- If there's an error while making an HTTP request, the script will log the error.