Skip to content

Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)

Notifications You must be signed in to change notification settings

im-hanzou/MSAPer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MSAPer | CVE-2023-3076 - MStore API

Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)


  • Using GNU Parallel. You must have parallel for run this tool.
  • If you found error like "$'\r': command not found" just do "dos2unix msaper.sh"

Install Parallel

  • Linux : apt-get install parallel -y
  • Windows : You can install WSL (windows subsystem linux) then do install like linux
    if you want use windows (no wsl), install GitBash then do this command for install parallel:
    [#] curl pi.dk/3/ > install.sh
    [#] sha1sum install.sh | grep 12345678
    [#] md5sum install.sh
    [#] sha512sum install.sh
    [#] bash install.sh

How To Use

  • Make sure you already install Parallel! Then do:
  • [#] git clone https://github.com/im-hanzou/MSAPer.git
  • [#] cd MSAPer && chmod +x msaper.sh
  • [#] For Linux or WSL: ./msaper.sh list.txt thread
  • [#] For Gitbash: TMPDIR=/tmp ./msaper.sh list.txt thread

Reference

Disclaimer:

  • This tool is for educational purposes only. Use it responsibly and with proper authorization. The author is not responsible for any misuse.

About

Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)

Topics

Resources

Stars

Watchers

Forks

Languages