diff --git a/exploits/multiple/webapps/50542.txt b/exploits/multiple/webapps/50542.txt index 08f2fa6b3..ca31b9f58 100644 --- a/exploits/multiple/webapps/50542.txt +++ b/exploits/multiple/webapps/50542.txt @@ -5,6 +5,7 @@ # Vendor Homepage: https://softwell.com.br/ # Version: 3.6.0.42 # Tested on: Kali Linux 2021.3 +# CVE: CVE-2021-43650 =-=-=-= Description =-=-=-= diff --git a/exploits/php/webapps/50882.py b/exploits/php/webapps/50882.py index b59d7b611..652f1cc44 100755 --- a/exploits/php/webapps/50882.py +++ b/exploits/php/webapps/50882.py @@ -39,7 +39,15 @@ import re # The file we upload must have the following structure: # 1. It must be a ZIP file. You can name it as you want. # 2. It must contain a folder called "elementor-pro" -# 3. This folder must contain a file named "elementor-pro.php" +# 3. This folder must contain a file named "elementor-pro.php"# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else) +# 4. The payload must contain AT LEAST the plugin name, otherwise WordPress will NOT accept it and the upload will FAIL +# e.g. +# # This file will be YOUR payload (e.g. PHP Reverse Shell or anything else) # # WARNING: The fake plugin we upload will be activated by Elementor, this means that each time we visit any page we trigger our payload.