Share
## https://sploitus.com/exploit?id=149A79B7-CA50-5FEF-BB75-0944CCF317D4
# CVE-2022-24637
Open Web Analytics 1.7.3 - Remote Code Execution Exploit v2

Working exploit for [Open Web Analytics 1.7.3 - RCE](https://www.rapid7.com/db/modules/exploit/multi/http/open_web_analytics_rce/) enhenced with pentestmonkey's [php reverse shell](https://github.com/pentestmonkey/php-reverse-shell), Fixed issue of not able to find user in cache.

Original soruce exploit can be found on [here](https://www.exploit-db.com/exploits/51026)


## Usage
Add your attacker machine's IP and PORT in `php-reverse-shell.php` file and run the `exploit.py` with argument `-u` for vulnerable target url.

```bash
python3 exploit.py -u https://target.host/owa/
```

### Credits
@JacobEbben

@pentestmonkey