Skip to content

The whole collection of Exploits developed by me (Hacker5preme)

License

Notifications You must be signed in to change notification settings

matmad/Exploits

 
 

Repository files navigation

Exploits

Collection of Exploits developed by Ron Jost

For Exploit-development requests, please reach out to me: hacker5preme@protonmail.com

Table of Contents:

  • Wordpress Plugin XCloner 4.2.12 - Remote Code Execution (Authenticated): CVE-2020-35948
  • Wordpress Plugin Modern Events Calendar Lite < 5.16.5 - RCE (Authenticated): CVE-2021-24145
  • Wordpress Plugin Modern Events Calendar Lite < 5.16.5 - Export Event Data (Unauthenticated): CVE-2021-24146
  • Wordpress Plugin Backup Guard < 1.6.0 - Remote Code Execution(Authenticated): CVE-2021-24155
  • Wordpress Plugin Responsive Menu < 4.0.3 - Remote Code Execution (Authenticated): CVE-2021-24160
  • Wordpress Plugin SP Project & Document Manager 4.21 - Remote Code Execution (Authenticated): CVE-2021-24347
  • Wordpress Plugin BulletProof Security V 5.1 - Sensitive information disclosure CVE-2021-39327
  • Wordpress Plugin Secure File Manager V <= 2.9.3 - Remtoe Code Execution (Authenticated): SFM-0day
  • Wordpress Plugin Duplcate Post V <= 1.1.9 - SQL Injection: CVE-2021-43408
  • Wordpress Plugin Catch Themes Demo Import V 1.6.1 - Remote Code Execution (Authenticated): CVE-2021-39352
  • Wordpress Plugin WP Visitor Statistics V <= 4.7 - SQL Injection (Authenticated): CVE-2021-24750
  • Wordpress Plugin RegistrationMagic V <= 5.0.1.5 - SQL Injection (Authenticated): CVE-2021-24862
  • Wordpress Plugin Modern Events Calendar V < 6.1.5 - SQL Injection (Unauthenticated) CVE-2021-24946
  • Wordpress Plugin Download Monitor WordPress V < 4.4.5 - SQL Injection (Authenticated) CVE-2021-24786
  • Wordpress Plugin 404 to 301 <= 2.0.2 - SQL-Injection (Authenticated) CVE-2015-9323
  • Wordpress Plugin Secure Copy Content Protection and Content Locking < 2.8.2 - SQL-Injection (Unauthenticated) CVE-2021-24931
  • Wordpress Plugin Perfect Survey < 1.5.2 - SQL Injection (Unauthenticated) CVE-2021-24762
  • Wordpress Plugin WP User Frontend < 3.5.26 - SQL-Injection (Authenticated)
  • GetSimple CMS 3.3.4 - Information Disclosure: CVE-2014-8722
  • OpenEMR 5.0.0 - Remote Code Execution (Authenticated): CVE-2017-9380
  • OpenEMR < 5.0.1.4 - Remote Code Execution (Authenticated): CVE-2018-15139
  • OpenEMR < 5.0.1.4 - /portal/account/register.php Authentication bypass: CVE-2018-15152
  • OpenEMR < 5.0.2 - Path Traversal (Authenticated): CVE-2019-14530
  • Trixbox 2.8.0.4 - 'lang' Remote Code Execution (Unauthenticated): CVE-2017-14535
  • Trixbox 2.8.0.4 - 'lang' Path Traversal: CVE-2017-14537
  • Monstra CMS <= 3.0.4 - Remote Code Execution (Authenticated): CVE-2018-6383
  • Codiad 2.8.4 - Remote Code Execution (Authenticated): CVE-2018-19423
  • Codiad 2.8.4 - Remote Code Execution (Authenticated) (2): CVE-2019-19208
  • Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated): CVE-2020-29607

CVE-2020-35948-Exploit

Exploit Title: Wordpress Plugin XCloner < 5.1.13 - Remote Code Execution (Authenticated)

CVE description:

An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.

ExploitDB:

Exploit Description:

Usage:

image

Usage Example:

image

CVE-2021-24145-Exploit

Exploit Title: Wordpress Plugin Modern Events Calendar Lite < 5.16.5 - Remote Code Execution (Authenticated)

CVE description:

Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly check the imported file, allowing PHP ones to be uploaded by administrator by using the 'text/csv' content-type in the request.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

CVE-2021-24146-Exploit

Exploit Title: Wordpress Plugin Modern Events Calendar Lite < 5.16.5 - Export Event Data (Unauthenticated)

CVE description:

Lack of authorisation checks in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly restrict access to the export files, allowing unauthenticated users to exports all events data in CSV or XML format for example.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2021-24155-Exploit

Wordpress Plugin Backup Guard < 1.6.0 - Remote Code Execution (Authenticated)

CVE description:

The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

CVE-2021-24160-Exploit

Wordpress Plugin Responsive Menu < 4.0.3 - Remote Code Execution (Authenticated)

CVE description:

In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.

ExploitDB:

  • pending submission

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

CVE-2021-24347-Exploit

Wordpress Plugin SP Project & Document Manager 4.21 - Remote Code Execution (Authenticated)

CVE description:

The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

SFM-0day:

Secure File Manager Wordpress plugin V 2.9.3 - Remote Code Execution (authenticated)

Description:

In the Secure File Manager Wordpress plugin V 2.9.3 and possibly before, authenticated users could upload php files by changing the content type and renaming the .php to extension to .phtml

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

CVE-2021-39327-Exploit

Wordpress Plugin BulletProof Security V 5.1 - Sensitive information disclosure

CVE description:

The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.

ExploitDB:

Exploit Description:

Usage:

grafik

CVE-2021-39352-Exploit

Wordpress Plugin Catch Themes Demo Import V 1.6.1 - Remote Code Execution (Authenticated)

CVE description:

The Catch Themes Demo Import WordPress plugin is vulnerable to arbitrary file uploads via the import functionality found in the ~/inc/CatchThemesDemoImport.php file, in versions up to 1.7, due to insufficient file type validation. This makes it possible for an attacker with administrative privileges to upload malicious files that can be used to achieve remote code execution.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

CVE-2021-24786-Exploit

Wordpress Plugin Download Monitor WordPress V 4.4.4 - SQL Injection (Authenticated)

CVE description:

The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2014-8722-Exploit

Exploit Title: GetSimple CMS 3.3.4 - Information Disclosure

CVE description:

GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via direct requests.

ExploitDB:

Exploit Description:

Usage:

python3 exploit.py Target_IP Target_Port CMS_path

Usage Example:

grafik

CVE-2021-43408-Exploit

Wordpress Plugin Dupliacte Post V 1.1.9 - SQL Injection

CVE description:

The "Duplicate Post" WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/ or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.

ExploitDB:

  • pending submission

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2021-24750-Exploit

Wordpress Plugin WP Visitor Statistics V 4.7 - SQL Injection (Authenticated)

CVE description:

The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2021-24862-Exploit

Wordpress Plugin RegistrationMagic V 5.0.1.5 - SQL Injection (Authenticated)

CVE description:

The RegistrationMagic WordPress plugin before 5.0.1.6 does not escape user input in its rm_chronos_ajax AJAX action before using it in a SQL statement when duplicating tasks in batches, which could lead to a SQL injection issue.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2021-24946-Exploit

Wordpress Plugin Modern Events Calendar V 6.1 - SQL Injection (Unauthenticated)

CVE description:

The Modern Events Calendar Lite WordPress plugin before 6.1.5 does not sanitise and escape the time parameter before using it in a SQL statement in the mec_load_single_page AJAX action, available to unauthenticated users, leading to an unauthenticated SQL injection issue.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

CVE-2015-9323-Exploit

Wordpress Plugin 404 to 301 <= 2.0.2 - SQL-Injection (Authenticated)

CVE description:

The 404-to-301 plugin before 2.0.3 for WordPress has SQL injection.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik grafik

CVE-2021-24762-Exploit

Wordpress Plugin Perfect Survey < 2.8.2 - SQL-Injection (Unauthenticated)

CVE description:

The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2021-25076-Exploit

Wordpress Plugin WP User Frontend < 3.5.26 - SQL-Injection (Authenticated)

CVE description:

The WP User Frontend WordPress plugin before 3.5.26 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2017-9830-Exploit

Exploit Title: OpenEMR 5.0.0 - Remote Code Execution (Authenticated)

CVE description:

OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application.

ExploitDB:

Exploit Description:

The OpenEMR application allows users from all roles to upload files. However, the application does not whitelist only certain type of files (e.g. PDF, JPG, PNG, DOCX, etc). At the contary, any type of files can be uploaded to the filesystem via the application. While OpenEMR recommends during the installation to restrict access to the repository hosting uploaded files, unfortunately, such recommendations are too often ignored by users and can result in full compromise of the web server and its data.

Usage:

python3 exploit.py -T Target_IP -P Target_Port -U OpenEMR_path -u username -p password

Usage Example:

grafik

grafik

CVE-2021-24931-Exploit

Wordpress Plugin Secure Copy Content Protection and Content Locking < 2.8.2 - SQL-Injection (Unauthenticated)

CVE description:

The Secure Copy Content Protection and Content Locking WordPress plugin before 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2018-15139-Exploit

Exploit Title: OpenEMR < 5.0.1.4 - Remote Code Execution (Authenticated)

CVE description:

Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory.

ExploitDB:

Exploit Description:

Open EMR is vulnerable to an unrestricted file upload vulnerability in super/manage_site_files.php. This is due to improper (non-existent), checks on the file submitted by the administrator. An authenticated user could use this vulnerability to escalate their privileges by uploaded a PHP web shell to execute system commands.

Usage:

grafik

Usage Example:

grafik grafik

CVE-2018-15152-Exploit

Exploit Title: OpenEMR < 5.0.1.4 - /portal/account/register.php Authentication bypass

CVE description:

Authentication bypass vulnerability in portal/account/register.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker to access multiple confidential files.

ExploitDB:

Exploit Description:

Usage:

grafik

CVE-2019-14530-Exploit

Exploit Title: OpenEMR < 5.0.2 - Path Traversal (Authenticated)

CVE description:

An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.

ExploitDB:

Exploit Description:

Usage:

grafik

Usage Example:

grafik

CVE-2017-14535-Exploit

Exploit Title: Trixbox 2.8.0.4 - 'lang' Remote Code Execution (Unauthenticated)

CVE description:

Trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.

ExploitDB:

Exploit description:

Usage:

python3 exploit.py [target_IP] [Target_Port] [Listen_IP] [Listen_Port]

Usage example:

grafik

CVE-2017-14537-Exploit

Exploit Title: Trixbox 2.8.0.4 - 'lang' Path Traversal

CVE description:

Trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php.

ExploitDB:

Exploit description:

Usage:

python3 exploit.py [target_IP] [target_Port]

Usage example:

grafik

CVE-2018-6383-Exploit

Exploit Title: Monstra CMS <= 3.0.4 - Remote Code Execution (Authenticated)

CVE description:

Monstra CMS through 3.0.4 has an authenticated Remote Code Execution vulnerability due to a file upload vulnerability.

ExploitDB:

Exploit Description:

Usage:

python3 exploit.py -T Target_IP -P Target_Port -U CMS_PATH -u username -p password

Usage Example:

image image

CVE-2018-19423-Exploit

Exploit Title: Codiad 2.8.4 - Remote Code Execution (Authenticated)

CVE description:

Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.

ExploitDB:

Exploit description:

An authenticated attacker can upload an executable file, by using components/filemanager/controller.php as http://Ipaddr/components/filemanager/controller.php?action=upload&path=/var/www/html/data/projectname

Usage:

python3 exploit.py [target_IP] [target_port] [username] [password]

Usage Example:

Uploading Webshell:

grafik

Using Webshell:

grafik

CVE-2019-19208-Exploit

Exploit Title: Codiad 2.8.4 - Remote Code Execution (Authenticated) (2)

CVE description:

Codiad Web IDE through 2.8.4 allows PHP Code injection.

ExploitDB:

Exploit description:

An unauthenticated attacker can inject PHP code before the initial configuration
that gets executed and therefore he can run arbitrary system commands on the server.

Usage:

python3 exploit.py [target_IP] [target_port]

Usage example:

grafik

CVE-2020-29607-Exploit

Exploit Title: Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)

CVE description:

A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.

ExploitDB:

Exploit Description:

An authenticated attack can upload a .phar file by using http://IP/admin.php?action=files to gain a webshell.

Usage:

python3 exploit.py Target_IP Target_Port Username

Uploading Webshell:

grafik

Using Webshell:

grafik

About

The whole collection of Exploits developed by me (Hacker5preme)

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%