支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: a25ca132fc89200aace4647634ad7975e96c1b2a

来源
关联漏洞
标题:WordPress plugin ReviewX 安全漏洞 (CVE-2023-2833)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin ReviewX 1.6.13及之前版本存在安全漏洞,该漏洞源于对rx_set_screen_options函数的限制不足,容易受到权限提升的影响。
Description
Mass Exploit Privileges Authentication (Subscriber to Administrator) - Wordpress Plugin ReviewX 
介绍
# CVE-2023-2833 Mass Exploit Generator by Alucard0x1

This repository contains an exploit for CVE-2023-2833, a privilege escalation vulnerability in the ReviewX plugin for WordPress versions up to and including 1.6.13.

## Description

The ReviewX plugin is vulnerable to privilege escalation, allowing a subscriber-level user to escalate their privileges to administrator-level.

## Usage

1. Create a subscriber account on the target website using the following credentials:
   - Username must be named set to = tt
   - Password must be set to = tt

2. Clone this repository and navigate to the exploit directory.

3. Prepare a `url.txt` file that contains a list of target website URLs, with one URL per line (main domain).

4. Run the exploit script by executing the following command:


```bash
Alucard0x1MassExploit.exe url.txt
```


## Credits

- Exploit Credit & Author: Lana Codes ([Lana Codes](https://lana.codes/lanavdb/a889c3ff-5df0-4d7e-951f-0b0406468efa/))
- Exploit Generator by : Alucard0x1
- CVE Information: [CVE-2023-2833](https://www.cve.org/CVERecord?id=CVE-2023-2833)

## Disclaimer

This exploit is provided for educational purposes only. Use it at your own risk. The author and OpenAI do not take responsibility for any illegal activities conducted with this exploit.


文件快照

[4.0K] /data/pocs/a25ca132fc89200aace4647634ad7975e96c1b2a ├── [ 15M] Alucard0x1MassExploit.exe ├── [1.3K] README.md └── [ 23] url.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。