DB: 2022-04-23
2 changes to exploits/shellcodes
This commit is contained in:
parent
093714dc70
commit
6350525c20
2 changed files with 10 additions and 1 deletions
|
@ -5,6 +5,7 @@
|
||||||
# Vendor Homepage: https://softwell.com.br/
|
# Vendor Homepage: https://softwell.com.br/
|
||||||
# Version: 3.6.0.42
|
# Version: 3.6.0.42
|
||||||
# Tested on: Kali Linux 2021.3
|
# Tested on: Kali Linux 2021.3
|
||||||
|
# CVE: CVE-2021-43650
|
||||||
|
|
||||||
=-=-=-= Description =-=-=-=
|
=-=-=-= Description =-=-=-=
|
||||||
|
|
||||||
|
|
|
@ -39,7 +39,15 @@ import re
|
||||||
# The file we upload must have the following structure:
|
# The file we upload must have the following structure:
|
||||||
# 1. It must be a ZIP file. You can name it as you want.
|
# 1. It must be a ZIP file. You can name it as you want.
|
||||||
# 2. It must contain a folder called "elementor-pro"
|
# 2. It must contain a folder called "elementor-pro"
|
||||||
# 3. This folder must contain a file named "elementor-pro.php"
|
# 3. This folder must contain a file named "elementor-pro.php"# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else)
|
||||||
|
# 4. The payload must contain AT LEAST the plugin name, otherwise WordPress will NOT accept it and the upload will FAIL
|
||||||
|
# e.g.
|
||||||
|
# <?php
|
||||||
|
# /**
|
||||||
|
# * Plugin Name: Elementor Pro
|
||||||
|
# */
|
||||||
|
# // Actual PHP payload
|
||||||
|
# ?>
|
||||||
# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else)
|
# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else)
|
||||||
#
|
#
|
||||||
# WARNING: The fake plugin we upload will be activated by Elementor, this means that each time we visit any page we trigger our payload.
|
# WARNING: The fake plugin we upload will be activated by Elementor, this means that each time we visit any page we trigger our payload.
|
||||||
|
|
Loading…
Add table
Reference in a new issue