关联漏洞
标题:WordPress plugin MasterStudy LMS 安全漏洞 (CVE-2022-0441)Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin MasterStudy LMS 2.7.5版本存在安全漏洞,该漏洞源于插件缺少访问控制,攻击者可利用该漏洞创建管理帐户。
Description
WordPress Plugin MasterStudy LMS 2.7.5 - Unauthenticated Admin Account Creation
介绍
# CVE-2022-0441
[](https://www.python.org/)
```
Title: WordPress Plugin MasterStudy LMS 2.7.5 - Unauthenticated Admin Account Creation
Date: 16.02.2022
Author: Numan Türle
CVE: CVE-2022-0441
Software Link: https://wordpress.org/plugins/masterstudy-lms-learning-management-system/
Version: <2.7.6
```
### Installation
```
git clone https://github.com/biulove0x/CVE-2022-0441.git
cd CVE-2022-0441/
python3 -m pip install -r requirements.txt
```
### How to run autoexploit
```
$ python3 MasterStudy.py --help
###############################################
# @author : biulove0x #
# @name : WP Plugins Master Study Exploiter #
# @cve : CVE-2022-0441 #
###############################################
usage: MasterStudy.py [-h] [-t example.com] [-l target.txt]
CVE-2022-0441 [ WordPress Plugin MasterStudy LMS 2.7.5 - Unauthenticated Admin Account Creation ]
optional arguments:
-h, --help show this help message and exit
-t example.com Single target
-l target.txt Multiple target
```
#### Single target
```
$ python3 MasterStudy.py -t http://example.com/
```
#### Multiple target
```
$ cat domains.txt
http://example.com/
https://examples.com/
$ python3 MasterStudy.py -l target.txt
```
### References :
* https://www.exploit-db.com/exploits/50752
* https://www.youtube.com/watch?v=SI_O6CHXMZk
* https://gist.github.com/numanturle/4762b497d3b56f1a399ea69aa02522a6
* https://wpscan.com/vulnerability/173c2efe-ee9c-4539-852f-c242b4f728ed
### Donate :
BTC : bc1qst09sxcnq97a4wgsqvpkg4fxyjczvs3xe7278h
BNB : bnb1jhp2hv9utr8u97387p35fmftgr8wpjp39altz0
[](https://www.buymeacoffee.com/biulove0x)
文件快照
[4.0K] /data/pocs/8a653e5295b960c5eb77854a819b417032d75772
├── [3.6K] MasterStudy.py
├── [1.8K] README.md
└── [ 37] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。