Usage of Symphony Google Dorks Checker Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.
$ git clone https://github.com/bizibabe/symfony-check-vuln-google-dorks.git
$ cd symfony-check-vuln-google-dorks
$ python3 -m pip install -r requirements.txt
- Create a Google Gmail account (Bypass Captcha)
- Connect on your new Gmail account / refresh
- python3 check_symfony.py --starturl 0 --nburl 20 -c YOUR_GOOGLE_COOKIE
usage: check_symfony.py [-h] [--nburl NBURL] [--starturl STARTURL] [--cookie COOKIE] [--all] [--jmp]
This tool allows you to scan the configuration of Symfony developer mode using Google Dorks.
By default the first 10 urls are scanned.
optional arguments:
-h, --help show this help message and exit
--nburl NBURL, -n NBURL
Specifies the total number of urls to scan
--starturl STARTURL, -s STARTURL
Specifies which url to start from on Google
--cookie COOKIE, -c COOKIE
Cookie from your google account to bypass the captcha
--all, -a Google Dorks paylods to increase targets but many more false positives
--jmp, -j Do not use the token bruteforce method
- Reload your Chrome browser and check if you have been detected as a bot
- Pass the check
- Put your new Google account cookie with -c option
Once you find vulnerable websites, you can take things a step further !
Token + Fragment + internal url = RCE
(https://github.com/synacktiv/eos/)
(https://github.com/ambionics/symfony-exploits)