Skip to content

Automatic Plugin for WordPress < 3.92.1 Multiples Vulnerabilities

Notifications You must be signed in to change notification settings

gh-ost00/CVE-2024-27954

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

⚠️ CVE-2024-27954

💀 Automatic Remote code Execution Exploit Tools | By GhostSec 💀


📝 Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0.

⌛ Queries

  • FOFA = body="wp-content/plugins/wp-automatic" && header="HTTP/1.1 200 OK"
  • ZoomEye = title:"wp-automatic" response.status_code:200
  • Shodan = http.title:"wp-automatic" http.status:200
  • Publicwww = "/wp-content/plugins/wp-automatic"

⌛ Installation

  1. Clone the repository:

    git clone https://github.com/fa-rrel/CVE-2024-27954.git
    cd CVE-2024-27954
  2. Install the required packages:

    pip install -r requirements.txt

🚀 Usage

  • RCE Usage
python RCE_Exploit.py -u <target_url> or <File.txt>
  • Nuclei usage
nuclei -t POC.yaml --target http://testphp.vulnweb.com/ or -l WPUrls.txt

☕ Support

If you find this tool useful and want to support the development, consider buying me a coffee: Buy Me a Coffee


⚠️ Disclaimer

This tool is intended for authorized security testing and educational purposes only. Unauthorized use against systems is strictly prohibited.

📄 License

This is tools licensed under the MIT License.

About

Automatic Plugin for WordPress < 3.92.1 Multiples Vulnerabilities

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages