Skip to content

That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit.

Notifications You must be signed in to change notification settings

iveresk/cve-2023-40000

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

cve-2023-40000

That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit.

The CVE could be applied to all LiteSpeed Cache < 5.7.0.1.
Works in two modes: check and attack.
The vulnerable IPs would grep version. If there is no version (the target is covered by WAF).
XSS code is encrypted for eval function with pre-defined login/pass/email.

# user_login=theattacker
# email=theattacker@whatever.com
# pass1=attackpass&pass2=attackpass
# role=administrator

usage

echo "----------------Welcome-to-cve-2023-40000-script-by-1veresk------------+";
	echo "+----------------------------------------------------------------------+";
	echo "+-------------------For-The-Help---------------------------------------+";
	echo "Example#1: ./cve-2023-40000.sh -h--------------------------------------+";
	echo "+-------------------For-The--Check-------------------------------------+";
	echo "Example#2: ./cve-2023-40000.sh <TARGET_FILE> <MODE>--------------------+";
	echo "+----------------------------------------------------------------------+";

About

That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages