POC详情: a6e757a66bef16163d9668c80a2e3240b011b285

来源
关联漏洞
标题: WordPress Plugin WP Automatic SQL注入漏洞 (CVE-2024-27956)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin WP Automatic 存在SQL注入漏洞,该漏洞源于存在 SQL 注入漏洞。
描述
CVE-2024-27956 - WP Automatic SQL Injection Exploit Tool
介绍



# WP Automatic Plugin SQL Injection Exploit (CVE-2024-27956)

![Python Version](https://img.shields.io/badge/python-3.6%2B-blue)
![License](https://img.shields.io/badge/license-MIT-green)
![Vulnerability](https://img.shields.io/badge/CVE-2024-27956-critical-red)

A proof-of-concept exploit for the SQL injection vulnerability in WP Automatic plugin (CVE-2024-27956) affecting WordPress sites.

## 📌 Description

This exploit targets a critical unauthenticated SQL injection vulnerability in the WP Automatic plugin (versions < 3.9.2.0) for WordPress. The vulnerability allows attackers to create administrative users and gain full control of vulnerable websites.

## 🚀 Features

- Automated vulnerability verification
- Admin user creation with configurable credentials
- Automatic strong password generation
- Clean command-line interface

## 🛠️ Installation

```bash
git clone https://github.com/devsec23/CVE-2024-27956.git
cd CVE-2024-27956
pip install -r requirements.txt
```

## 💻 Usage

### Basic exploitation:
```bash
python3 exploit.py http://vulnerable-site.com
```

### Custom username and password:
```bash
python3 exploit.py http://vulnerable-site.com -u admin -p P@ssw0rd123
```

### Using a proxy:
```bash
python3 exploit.py http://vulnerable-site.com --proxy http://127.0.0.1:8080
```

## 📋 Options

```
positional arguments:
  url                   Target WordPress URL

optional arguments:
  -h, --help            show this help message and exit
  -u USERNAME, --username USERNAME
                        Username for the new admin account
  -p PASSWORD, --password PASSWORD
                        Password for the new admin account

```

## ⚠️ Legal Disclaimer

This tool is provided for **educational and authorized penetration testing purposes only**. The developer is not responsible for any misuse of this software. Always obtain proper authorization before testing any systems.

## 📜 License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## 🔗 References

- [CVE-2024-27956 Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27956)
- [WP Automatic Plugin](https://wordpress.org/plugins/wp-automatic/)
- [WordPress Security Advisory](https://wordpress.org/news/category/security/)
```

文件快照

[4.0K] /data/pocs/a6e757a66bef16163d9668c80a2e3240b011b285 ├── [3.6K] Exploit.py └── [2.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。