Share
## https://sploitus.com/exploit?id=F3A670A3-07EC-5A47-989B-E0112A1C5359
<p align="center"> <img src="cve202329489/Pictures/screenshot1.png" /></p>
<p align="left"> <img src="https://komarev.com/ghpvc/?username=md-thalal&label=Profile%20views&color=0e75b6&style=flat" alt="md-thalal" /> </p>
[![MIT License](https://img.shields.io/badge/License-MIT-green.svg)](https://choosealicense.com/licenses/mit/)
## Introductoin
An exploitable reflected cross-site scripting (XSS) vulnerability has been discovered in certain versions of cPanel and was assigned with CVE-2023-29489. This vulnerability allows attackers to execute arbitrary JavaScript code without requiring authentication. The XSS vulnerability can still be exploited even if the cPanel management ports are not externally exposed. Websites on ports 80 and 443 are also susceptible to this vulnerability if they are managed by cPanel.
## About
An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.
## Installation
- Step 1 : Use this command in terminal to install the CVE-2023-29489
```
pip install CVE-2023-29489
```
- Step 2 : To check type help commad to show the option
```
CVE-2023-29489 -h
```
<img src = "cve202329489/Pictures/screenshot2.png" />
## Table
| Options | Description | Examples |
| :--------: | :-------: | :-----------: |
| -u, --url | URL to scan | CVE-2023-29489 -u https://target.com |
| -i, --input | <filename> Read input from txt | CVE-2023-29489 -i target.txt |
| -o, --output | <filename> Write output in txt file | CVE-2023-29489 -i target.txt -o output.txt |
| -c, --chatid | Creating Telegram Notification | CVE-2023-29489 --chatid yourid |
| -b, --blog | To Read about CVE-2023-29489 Bug | CVE-2023-29489 -b |
| -h, --help | Help Menu |
## Sample Output
```
v1.0
_______ ________ ___ ____ ___ ___ ___ ________________
/ ____/ | / / ____/ |__ \ / __ \__ \|__ \ |__ \< /__ /__ < /
/ / | | / / __/________/ // / / /_/ /__/ /_______/ // / /_ < / // /
/ /___ | |/ / /__/_____/ __// /_/ / __// __/_____/ __// /___/ / / // /
\____/ |___/_____/ /____/\____/____/____/ /____/_//____/ /_//_/
Developed By https://cappriciosec.com
CVE-2022-21371 : Bug scanner for WebPentesters and Bugbounty Hunters
$ CVE-2022-21371 [option]
Usage: CVE-2022-21371 [options]
Options:
-u, --url URL to scan CVE-2022-21371 -u https://target.com
-i, --input <filename> Read input from txt CVE-2022-21371 -i target.txt
-o, --output <filename> Write output in txt file CVE-2022-21371 -i target.txt -o output.txt
-c, --chatid Creating Telegram Notification CVE-2022-21371 --chatid yourid
-b, --blog To Read about CVE-2022-21371 Bug CVE-2022-21371 -b
-h, --help Help Menu
```
<img src="cve202329489/Pictures/Screenshot3.png" width=100% />
<h3 align="left">Languages and Tools:</h3>
<p align="left"> <a href="https://www.python.org" target="_blank" rel="noreferrer"> <img src="https://raw.githubusercontent.com/devicons/devicon/master/icons/python/python-original.svg" alt="python" width="40" height="40"/> </a> </p>
## Author
[@karthi-the-hacker](https://github.com/karthi-the-hacker)
## Contact with Cappricio Securities
Website : [https://cappriciosec.com/](https://cappriciosec.com/)
Email : contact@cappriciosec.com