关联漏洞
描述
Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360.
介绍
# 🚀 WordPress Royal Elementor Addons and Templates Exploit
Exploit for the unauthenticated file upload vulnerability in Royal Elementor Addons and Templates < 1.3.79.
## 📌 Description
The `Royal Elementor Addons and Templates` plugin for WordPress is vulnerable to an unauthenticated file upload vulnerability. This exploit leverages this vulnerability to upload malicious payloads to vulnerable WordPress installations.
Vulnerable versions: < 1.3.79
CVE-ID: CVE-2023-5360
WPVDB ID: [281518ff‑7816‑4007‑b712‑63aed7828b34](https://wpscan.com/vulnerability/281518ff‑7816‑4007‑b712‑63aed7828b34/)
CVSSv3.1: 10.0
## 🛠️ Installation
1. Clone the repository:
```bash
git clone https://github.com/Chocapikk/CVE-2023-5360.git
```
2. Navigate to the repository's directory:
```bash
cd CVE-2023-5360
```
3. Install the required dependencies:
```bash
pip install -r requirements.txt
```
## 🛠️ Usage
1. Use the following command to exploit a single URL:
```bash
python3.10 exploit.py -u <TARGET_URL> -v
```
Or use the following command to exploit a list of URLs:
```bash
python3.10 exploit.py -l <URL_LIST_FILE> -v
```
Optional arguments:
`-f, --file` : Use a custom PHP file to upload
`-o, --output`: Save vulnerable URLs to an output file
## 📣 Disclaimer
🚫 **Usage of this exploit without prior mutual consent is illegal.** It's the end user's responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
## ⚠️ Advisory
Ensure your WordPress installations are fully updated to safeguard against this vulnerability. Particularly, update the `Royal Elementor Addons and Templates` plugin to version 1.3.79 or later.
## 🙏 Acknowledgements
Kudos to all researchers and developers working hard to protect the web!
文件快照
[4.0K] /data/pocs/30b1e9e981766bed37da39007add7a4899597dba
├── [ 16K] CVE-2023-5360.py
├── [7.2K] exploit.py
├── [1.9K] README.md
└── [ 52] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。