GitHub: https://github.com/Jenderal92/CVE-2024-9290
The tool targets WordPress websites that use the Super Backup & Clone plugin and are vulnerable to arbitrary file upload. It attempts to upload a malicious shell into the /wp-content/uploads/isnapshots/
directory. Once uploaded, the tool validates the existence of the shell and logs successful uploads into a shells.txt
file.
Features
- Multi-threading: Processes up to 10 URLs simultaneously for faster exploitation.
- Custom Shell Upload: Uses the malicious shell hosted on GitHub as a payload.
- Logging: Logs successful exploits into
shells.txt
for easy reference.
Usage
Prerequisites
- Python 2.7 is required to run this tool.
- Ensure you have the
requests
library installed:pip install requests
Steps to Use
- Clone this repository or download the script.
- Create a text file containing a list of target URLs, one URL per line.
- Run the script:python CVE-2024-9290.py
- Enter the path to the file containing the URLs when prompted.
- The tool will attempt to exploit each target and log any successes to
shells.txt
.
Key Points
- Educational Use Only: This tool is designed for ethical hacking and penetration testing under authorized conditions.
- Do Not Misuse: Unauthorized use is illegal and may result in severe consequences.
- Customizable: Users can modify the script for specific payloads or requirements.
Disclaimer:
I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!