Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hunthubspace/cve-2024-0757-exploit
A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)
https://github.com/hunthubspace/cve-2024-0757-exploit
bugbounty cve ethical-hacking exploit penetration-testing web
Last synced: about 12 hours ago
JSON representation
A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)
- Host: GitHub
- URL: https://github.com/hunthubspace/cve-2024-0757-exploit
- Owner: hunThubSpace
- Created: 2024-06-17T07:46:21.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-06-18T14:12:08.000Z (8 months ago)
- Last Synced: 2024-06-18T17:30:20.791Z (8 months ago)
- Topics: bugbounty, cve, ethical-hacking, exploit, penetration-testing, web
- Language: Python
- Homepage: https://www.hunthub.space
- Size: 10.7 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2024-0757 (Exploit)
## Description
The Insert or Embed Articulate Content into WordPress plugin for WordPress is vulnerable to arbitrary file uploads through insecure file uploads in a zip archive in all versions up to, and including, 4.3000000023. This makes it possible for unauthenticated attackers to upload zip files containing phar files on the affected site's server which may make remote code execution possible.> [!IMPORTANT]
> CVSS: **8.8 (High)** [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H]
> Software Type: **Plugin**
> Software Slug: **insert-or-embed-articulate-content-into-wordpress**
> Affected Version: **<= 4.3000000023**## Exploit
1. Clone the exploit
``` bash
git clone https://github.com/hunThubSpace/CVE-2024-0757-Exploit.git && cd CVE-2024-0757-Exploit
```
2. Install requirements
``` bash
pip install -r requirements.txt
```
3. Run exploit
``` bash
python3 exploit.py
```
4. Browse to given url and click on **Go to shell page**
5. You have a shell :)## PoC video
https://github.com/hunThubSpace/CVE-2024-0757-Exploit/assets/49031710/6855e8c4-a00b-469d-bcec-7b2252352ee4