Share
## https://sploitus.com/exploit?id=02CCA169-3B69-53D0-AE15-4C4BA3EAA78C
# MSAPer | CVE-2023-3076 - MStore API 
Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)<br><br>
<img src="https://github.com/im-hanzou/MSAPer/blob/main/image/msaper.png" width=600></img><br>
- Using GNU Parallel. You must have parallel for run this tool.<br>
- <b>If you found error like "$'\r': command not found" just do "dos2unix msaper.sh"</b>
# Install Parallel
- Linux : <code>apt-get install parallel -y</code><br>
- Windows : You can install WSL (windows subsystem linux) then do install like linux<br>if you want use windows (no wsl), install <a href="https://git-scm.com/download/win">GitBash</a> then do this command for install parallel: <br>
[#] <code>curl pi.dk/3/ > install.sh </code><br>[#] <code>sha1sum install.sh | grep 12345678 </code><br>[#] <code>md5sum install.sh </code><br>[#] <code>sha512sum install.sh </code><br>[#] <code>bash install.sh</code><br>
# How To Use
- <b>Make sure you already install Parallel!</b> Then do:
- [#] <code>git clone https://github.com/im-hanzou/MSAPer.git</code>
- [#] <code>cd MSAPer && chmod +x msaper.sh</code>
- [#] For Linux or WSL: <code>./msaper.sh list.txt thread</code>
- [#] For Gitbash: <code>TMPDIR=/tmp ./msaper.sh list.txt thread</code>
# Reference
- https://nvd.nist.gov/vuln/detail/CVE-2023-3076
- https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b
- https://github.com/advisories/GHSA-gwr5-qqvh-c57m
# Disclaimer:
- <b><i>This tool is for educational purposes only. Use it responsibly and with proper authorization. The author is not responsible for any misuse.</b></i>