Skip to content

A python script that exploits the vulnerability in the duplicate post wordpress plugin. This vulnerability was reported on March 22, 2019 by the Sucuri team, and patched in duplicate post version 3.4. Please use reasonably!

hoefler02/wordpress-duplicate-post-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Wordpress Duplicate Post Plugin SQLi

A python script that exploits the vulnerability in the duplicate post wordpress plugin. This vulnerability was reported on March 22, 2019 by the Sucuri team, and patched in duplicate post version 3.4.

Usage

The arguments to the script are listed below. Please use responsibly!

'--url', The base URL to the wordpress installation. Make sure to end with slash (ex. http://example.com/).
'--username', Wordpress username.
'--password', Wordpress password
'--query', The SQL statement to be executed.
'--delay N', Delay the attack queries for N seconds. Defaults to 2 seconds. Increase this for slower internet connections.
'--clean', Each query makes a new duplicate post. That's alot of posts. Option 1 will delete them as they are created (slow) and option 2 will delete them after the exploit.
'--output N', Print leaked data every time "N" new characters are leaked.

Information

This script was created for a challenge in the BCACTF event.

About

A python script that exploits the vulnerability in the duplicate post wordpress plugin. This vulnerability was reported on March 22, 2019 by the Sucuri team, and patched in duplicate post version 3.4. Please use reasonably!

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages