The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php
file.
An attacker can control the values passed to an include
statement, leveraging that to achieve remote code execution. This vulnerability allows unauthenticated attackers to execute code on the server easily.
pip install -r requirements.txt
python exploit.py -u <base_url>
Replace <base_url>
with the base URL of the target WordPress site. Ensure that the target site is vulnerable to CVE-2023-6553 and that you have the appropriate authorization to perform testing.
For example:
python exploit.py -u https://example.com
-f
option or output the results to a file using the -o
option.-t
option followed by the number of threads:python exploit.py -f urls.txt -t 10 -o vulnerable.txt
urls.txt
using 10 threads and output the results to vulnerable.txt
.exit
.clear
.shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…