There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).# CVE-2019-20361-EXPLOIT
There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).
This script is a "sanized-version" of original script avalible on exploit-db.com created by @KBA@SOGETI_ESEC
,the original version was sanized on RaidForums.com

<h3>COMMAND</h3>
<p> > $ git clone https://github.com/jerrylewis9/CVE-2019-20361-EXPLOIT.git <br>
> $ cd CVE-2019-20361-EXPLOIT <br>
> $ chmod +x noodles.sh <br>
> $ bash noodles.sh "url"</p>
<h3>PREREQUISITE</h3>
**sqlmap** (https://github.com/sqlmapproject/sqlmap)
#The script recognize sqlmap, not sqlmap.py or similiar, so move sqlmap to bin directory.
[4.0K] /data/pocs/e93175b2d2507fb88e443722e9f06bf11c19b38e
├── [7.1K] noodles.sh
└── [ 883] README.md
0 directories, 2 files