Skip to content

m3ssap0/wordpress-jetpack-broken-access-control-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

wordpress-jetpack-broken-access-control-exploit

This is a Python3 program that exploits Jetpack < 13.9.1 broken access control vulnerability (CVE-2024-9926).

DISCLAIMER

This tool is intended for security engineers and appsec people for security assessments. Please use this tool responsibly. I do not take responsibility for the way in which any one uses this application. I am NOT responsible for any damages caused or any crimes committed by using this tool.

Vulnerability info

Help

$ ./exploit.py --help
usage: exploit.py [-h] -t TARGET -u USERNAME -ap APPLICATION_PASSWORD [-v]

Exploit for Jetpack < 13.9.1 broken access control vulnerability. - v1.0 (2024-11-01)

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        URL of the target WordPress
  -u USERNAME, --username USERNAME
                        Username of WordPress
  -ap APPLICATION_PASSWORD, --application-password APPLICATION_PASSWORD
                        Application Password generated for the user (it's NOT the user password)
  -v, --verbose         verbose mode

Examples

./exploit.py -t https://localhost:1337 -u attacker -ap "AAAA 1111 bbbb 2222 CCCC 3333"

Vulnerable application

A vulnerable application can be setup using this repository.

Authors

  • Antonio Francesco Sardella - implementation - m3ssap0

License

See the LICENSE file for details.

Acknowledgments

  • Marc Montpas, the security researcher who discovered the vulnerability.

Releases

No releases published

Packages

No packages published

Languages