Share
## https://sploitus.com/exploit?id=F3A670A3-07EC-5A47-989B-E0112A1C5359
<p align="center"> <img src="cve202329489/Pictures/screenshot1.png" /></p>

<p align="left"> <img src="https://komarev.com/ghpvc/?username=md-thalal&label=Profile%20views&color=0e75b6&style=flat" alt="md-thalal" /> </p>
  
  [![MIT License](https://img.shields.io/badge/License-MIT-green.svg)](https://choosealicense.com/licenses/mit/)




## Introductoin
  An exploitable reflected cross-site scripting (XSS) vulnerability has been discovered in certain versions of cPanel and was assigned with CVE-2023-29489. This vulnerability allows attackers to execute arbitrary JavaScript code without requiring authentication. The XSS vulnerability can still be exploited even if the cPanel management ports are not externally exposed. Websites on ports 80 and 443 are also susceptible to this vulnerability if they are managed by cPanel.
## About 
  An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.

## Installation

- Step 1 : Use this command in terminal to install the CVE-2023-29489

```
    pip install CVE-2023-29489 
```

- Step 2 : To check type help commad to show the option

```
    CVE-2023-29489 -h
```

<img src = "cve202329489/Pictures/screenshot2.png" />

## Table

| Options      | Description                         |   Examples                                 | 
| :--------:   | :-------:                           | :-----------:                              |
| -u, --url    | URL to scan                         | CVE-2023-29489 -u https://target.com       |
| -i, --input  |  <filename> Read input from txt     | CVE-2023-29489 -i target.txt               |
| -o, --output | <filename> Write output in txt file | CVE-2023-29489 -i target.txt -o output.txt |
| -c, --chatid | Creating Telegram Notification      | CVE-2023-29489 --chatid yourid             |
| -b, --blog   |    To Read about CVE-2023-29489 Bug | CVE-2023-29489 -b                          |
|  -h, --help  |   Help Menu |


## Sample Output 
```
                                                                           v1.0
   _______    ________    ___   ____ ___  ___       ___  ________________        
  / ____/ |  / / ____/   |__ \ / __ \__ \|__ \     |__ \<  /__  /__  <  /        
 / /    | | / / __/________/ // / / /_/ /__/ /_______/ // / /_ <  / // /
/ /___  | |/ / /__/_____/ __// /_/ / __// __/_____/ __// /___/ / / // /
\____/  |___/_____/    /____/\____/____/____/    /____/_//____/ /_//_/

                              Developed By https://cappriciosec.com


CVE-2022-21371 : Bug scanner for WebPentesters and Bugbounty Hunters

$ CVE-2022-21371 [option]

Usage: CVE-2022-21371 [options]

Options:
  -u, --url     URL to scan                                CVE-2022-21371 -u https://target.com
  -i, --input   <filename> Read input from txt             CVE-2022-21371 -i target.txt
  -o, --output  <filename> Write output in txt file        CVE-2022-21371 -i target.txt -o output.txt
  -c, --chatid  Creating Telegram Notification             CVE-2022-21371 --chatid yourid
  -b, --blog    To Read about CVE-2022-21371 Bug           CVE-2022-21371 -b
  -h, --help    Help Menu
```
<img src="cve202329489/Pictures/Screenshot3.png" width=100% />

<h3 align="left">Languages and Tools:</h3>
<p align="left"> <a href="https://www.python.org" target="_blank" rel="noreferrer"> <img src="https://raw.githubusercontent.com/devicons/devicon/master/icons/python/python-original.svg" alt="python" width="40" height="40"/> </a> </p>

## Author 
[@karthi-the-hacker](https://github.com/karthi-the-hacker)

## Contact with Cappricio Securities

Website : [https://cappriciosec.com/](https://cappriciosec.com/)

Email : contact@cappriciosec.com