airbus-cert / CVE-2024-4040

Scanner for CVE-2024-4040
49 stars 8 forks source link

Command help #1

Closed krivadna closed 5 months ago

krivadna commented 5 months ago

Pls.provide the proper command syntax. Appreciate it

simsor commented 5 months ago

Hello !

You can use the --help flag for both commands in order to get their help and syntax:

$ python scan_host.py --help
usage: scan_host.py [-h] target

Scan a target for CrushFTP File Read vulnerability

positional arguments:
  target      URL to target (example: http://127.0.0.1:9090)

options:
  -h, --help  show this help message and exit

$ python scan_logs.py --help
usage: scan_logs.py [-h] dir

Evaluate if the CrushFTP File Read vulnerability was exploited

positional arguments:
  dir         Path to CrushFTP installation directory

options:
  -h, --help  show this help message and exit
krivadna commented 5 months ago

I did try that but didn't work,

scan_host.py -h target example.com

Is the above correct pr do we have to enter the ip?

simsor commented 5 months ago

The correct syntax is as follows:

$ python3 scan_host.py http://your.crushftp.domain
$ python3 scan_logs.py /path/to/CrushFTP/
krivadna commented 5 months ago

Wonderful. Thanks

On Thu, 2 May, 2024, 9:57 pm Simon Garrelou, @.***> wrote:

The correct syntax is as follows:

$ python3 scan_host.py http://your.crushftp.domain $ python3 scan_logs.py /path/to/CrushFTP/

— Reply to this email directly, view it on GitHub https://github.com/airbus-cert/CVE-2024-4040/issues/1#issuecomment-2090968433, or unsubscribe https://github.com/notifications/unsubscribe-auth/AOAED5WZ7PFRM6HIX2F4Z6LZAJSNJAVCNFSM6AAAAABHD6DM3SVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDAOJQHE3DQNBTGM . You are receiving this because you authored the thread.Message ID: @.***>