Skip to content

A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.

License

Notifications You must be signed in to change notification settings

Cappricio-Securities/CVE-2021-20323

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

logo

Badges

MIT License PyPI - Version PyPI - Downloads GitHub all releases Profile_view Follow Twitter

License

MIT

Installation

  1. Install Python3 and pip Instructions Here (If you can't figure this out, you shouldn't really be using this)

    • Install via pip
      •    pip install CVE-2021-20323 
    • Run bellow command to check
      • CVE-2021-20323 -h

Configurations

  1. We integrated with the Telegram API to receive instant notifications for vulnerability detection.

    • Telegram Notification
      •    CVE-2021-20323 --chatid <YourTelegramChatID>
    • Open your telegram and search for @CappricioSecuritiesTools_bot and click start

Usages

  1. This tool has multiple use cases.

    • To Check Single URL
      •    CVE-2021-20323 -u http://example.com 
    • To Check List of URL
      •   CVE-2021-20323 -i urls.txt 
    • Save output into TXT file
      •   CVE-2021-20323 -i urls.txt -o out.txt
    • Want to Learn about CVE-2021-20323? Then Type Below command
      •   CVE-2021-20323 -b

Lab

  1. Lab url.
    • Testing syntax URL
    •    CVE-2021-20323 -u https://labs.cappriciosec.com/CVE-2021-20323/

🚨 Disclaimer

This tool is created for security bug identification and assistance; Cappricio Securities is not liable for any illegal use. Use responsibly within legal and ethical boundaries. 🔐🛡️

Working PoC Video

asciicast

Help menu

Get all items

👋 Hey Hacker
                                                                v1.0
  ______   ______    ___  ___  ___ ___    ___  ___  ____ ___  ____
 / ___/ | / / __/___|_  |/ _ \|_  <  /___|_  |/ _ \|_  /|_  ||_  /
/ /__ | |/ / _//___/ __// // / __// /___/ __// // //_ </ __/_/_ < 
\___/ |___/___/   /____/\___/____/_/   /____/\___/____/____/____/     

                                   Developed By https://cappriciosec.com


CVE-2021-20323 : Bug scanner for WebPentesters and Bugbounty Hunters 

$ CVE-2021-20323 [option]

Usage: CVE-2021-20323 [options]
Argument Type Description Examples
-u --url URL to scan CVE-2021-20323 -u https://target.com
-i --input filename Read input from txt CVE-2021-20323 -i target.txt
-o --output filename Write output in txt file CVE-2021-20323 -i target.txt -o output.txt
-c --chatid Creating Telegram Notification CVE-2021-20323 --chatid yourid
-b --blog To Read about CVE-2021-20323 Bug CVE-2021-20323 -b
-h --help Help Menu CVE-2021-20323 -h

🔗 Links

Website linkedin twitter

Author

Feedback

If you have any feedback, please reach out to us at [email protected]