CVE-2019-9054 exploit added support for python3 + bug fixes### *The user assumes all responsibility for any action taken using this tool. If these terms are not acceptable to you, please do not use this tool. Use it only in environments where you are permitted to perform pentesting activities*
# Bug fixes for the [CVE-2019-9053 exploit](https://www.exploit-db.com/exploits/46635)
Some bug fixes for the CVE-2019-9053 exploit, affecting CMS Made Simple < 2.2.10 that uses SQL Injection. I found this bug while doing the [Simple CTF at TryHackMe](https://tryhackme.com/r/room/easyctf)
* Link to the original exploit [here](https://www.exploit-db.com/exploits/46635)
<div align="center">
<img src="screenshot.png" />
</div>
## How to fix this bug
1) Clone the repository
```
git clone https://github.com/FedericoTorres233/CVE-2019-9053-Fixed
```
2) Create a file named cve.py and copy the contents of the [raw file](https://www.exploit-db.com/raw/46635) or [download it](https://www.exploit-db.com/exploits/46635)
```
touch cve.py
```
3) Apply the patch
```
patch cve.py < cve.diff
```
4) Execute the command using `python3`
[4.0K] /data/pocs/15fce8d70d39d442a2d00f2b40be348df695fab5
├── [2.1K] cve.diff
├── [1.0K] README.md
└── [152K] screenshot.png
0 directories, 3 files