The goal of this tool is to send PoC payloads to verify server-side attack detection solutions. If detected, the server side should return a specified HTTP status code.
This tool is not intended to actually exploit the vulnerability or to test for the existence of the vulnerability.
Basic:
./webcve.py --url https://target-site.comSpecify detected response code (default is 403):
./webcve.py --url https://target-site.com --status-code 406Verbose (output CVE descriptions):
./webcve.py --url https://target-site.com -vTest a single CVE (with example output):
./webcve.py --url https://target-site.com --status-code 406 --cve CVE-2017-9791 -v
CVE-2017-9791
The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution
via a malicious field value passed in a raw message to the ActionMessage.
Test passed (406)
Test passed (406)
Test passed (406)
Test passed (406)Test for a group of CVEs. Groups are defined in groups.json.
./webcve.py --url https://target-site.com --group strutsTest for a group type of CVEs. Types are defined in groups.json.
./webcve.py --url https://target-site.com --type cmsList available groups or types.
./webcve.py --list group./webcve.py --list typePull requests are welcome. Please use the existing CVE directories as examples of how you should structure your submission.