关联漏洞
描述
CVE-2024-27956 - WP Automatic SQL Injection Exploit Tool
介绍
# WP Automatic Plugin SQL Injection Exploit (CVE-2024-27956)



A proof-of-concept exploit for the SQL injection vulnerability in WP Automatic plugin (CVE-2024-27956) affecting WordPress sites.
## 📌 Description
This exploit targets a critical unauthenticated SQL injection vulnerability in the WP Automatic plugin (versions < 3.9.2.0) for WordPress. The vulnerability allows attackers to create administrative users and gain full control of vulnerable websites.
## 🚀 Features
- Automated vulnerability verification
- Admin user creation with configurable credentials
- Automatic strong password generation
- Clean command-line interface
## 🛠️ Installation
```bash
git clone https://github.com/devsec23/CVE-2024-27956.git
cd CVE-2024-27956
pip install -r requirements.txt
```
## 💻 Usage
### Basic exploitation:
```bash
python3 exploit.py http://vulnerable-site.com
```
### Custom username and password:
```bash
python3 exploit.py http://vulnerable-site.com -u admin -p P@ssw0rd123
```
### Using a proxy:
```bash
python3 exploit.py http://vulnerable-site.com --proxy http://127.0.0.1:8080
```
## 📋 Options
```
positional arguments:
url Target WordPress URL
optional arguments:
-h, --help show this help message and exit
-u USERNAME, --username USERNAME
Username for the new admin account
-p PASSWORD, --password PASSWORD
Password for the new admin account
```
## ⚠️ Legal Disclaimer
This tool is provided for **educational and authorized penetration testing purposes only**. The developer is not responsible for any misuse of this software. Always obtain proper authorization before testing any systems.
## 📜 License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
## 🔗 References
- [CVE-2024-27956 Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27956)
- [WP Automatic Plugin](https://wordpress.org/plugins/wp-automatic/)
- [WordPress Security Advisory](https://wordpress.org/news/category/security/)
```
文件快照
[4.0K] /data/pocs/a6e757a66bef16163d9668c80a2e3240b011b285
├── [3.6K] Exploit.py
└── [2.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。