Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-27956 PoC — WordPress Plugin WP Automatic SQL注入漏洞

Source
Associated Vulnerability
Title:WordPress Plugin WP Automatic SQL注入漏洞 (CVE-2024-27956)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin WP Automatic 存在SQL注入漏洞,该漏洞源于存在 SQL 注入漏洞。
Description
Perform with massive Wordpress SQLI 2 RCE
Readme
# Wordpress SQLI-2-RCE Exploit
- This Python script exploits CVE-2024-27956, a vulnerability in Wordpress that allows for SQL Injection leading to Remote Code Execution (RCE).

# Features
- Multi-threaded Exploitation: Utilizes concurrent threads to exploit multiple Wordpress instances simultaneously.
- Dynamic Payload Injection: Constructs SQL queries dynamically to inject malicious code into vulnerable Wordpress installations.
- Detailed Logging and Error Handling: Uses colorama and coloredlogs for enhanced console output with color-coded messages.

# Requirements
- Python 3.x
- Required Python packages (requests, argparse, colorama, coloredlogs, concurrent.futures)\

# Usage
- python exploit.py -f urls.txt [-t NUM_THREADS]
- -f, --file: File containing URLs/IPs of Wordpress instances, one per line.
- -t, --threads: Number of threads to use for concurrent requests (default: 5).

# Author
- Pari Malam
File Snapshot

[4.0K] /data/pocs/1ea6c6634f4231c064db10844dd5c6f4db4401c9 ├── [8.2K] CVE-2024-27956.py ├── [ 916] README.md └── [1.0M] wp-automatic.zip 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.