Coder Social home page Coder Social logo

gavin1231t / cve-2023-6553 Goto Github PK

View Code? Open in Web Editor NEW

This project forked from chocapikk/cve-2023-6553

0.0 0.0 0.0 10 KB

Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution

Home Page: https://www.wordfence.com/blog/2023/12/critical-unauthenticated-remote-code-execution-found-in-backup-migration-plugin/

Python 100.00%

cve-2023-6553's Introduction

CVE-2023-6553 Exploit V2 ๐Ÿš€

Description ๐Ÿ“

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. An attacker can control the values passed to an include statement, leveraging that to achieve remote code execution. This vulnerability allows unauthenticated attackers to execute code on the server easily.

Installation ๐Ÿ› ๏ธ

  1. Ensure you have Python 3.x installed on your system.

  2. Install the required Python libraries by running the following command in your terminal (navigate to the project directory first):

    pip install -r requirements.txt

Running the Exploit ๐Ÿƒ

  1. After installing the dependencies, you can run the exploit using the following command:

    python exploit.py -u <base_url>

    Replace <base_url> with the base URL of the target WordPress site. Ensure that the target site is vulnerable to CVE-2023-6553 and that you have the appropriate authorization to perform testing.

    For example:

    python exploit.py -u https://example.com

    The exploit will attempt to exploit the vulnerability and write a PHP file on the target server. You can also specify a list of URLs to check using the -f option or output the results to a file using the -o option.

  2. To use multiple threads for scanning multiple URLs, use the -t option followed by the number of threads:

    python exploit.py -f urls.txt -t 10 -o vulnerable.txt

    This will scan the list of URLs provided in urls.txt using 10 threads and output the results to vulnerable.txt.

Using the Interactive Shell ๐Ÿš (if successful)

  1. If the exploit successfully writes the PHP file on the target server, you will be given access to an interactive shell to execute commands on the server.

  2. The interactive shell operates similarly to a Unix terminal. You can enter commands and see the output.

  3. To exit the interactive shell, type exit.

  4. To clear the screen, type clear.

โš ๏ธ Please remember that it is illegal and unethical to use this exploit against systems without explicit permission. Always ensure you have the appropriate authorization before testing the vulnerability of a website.

cve-2023-6553's People

Contributors

chocapikk avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.