## https://sploitus.com/exploit?id=5DAE76B8-0B51-56FE-B547-1861D3FC9480
Graver
===========
# Description
Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116).
It creates a malicious RCE page on the server running the vulnerable Grav CMS.
# References:
* [https://nvd.nist.gov/vuln/detail/CVE-2024-28116](https://nvd.nist.gov/vuln/detail/CVE-2024-28116)
# Notes
Since it is an authenticated vulnerability it is needed to use valid credentials (hardcoding them on the script) of a Grav CMS editor user.
# Usage
Following is reported an usage example of the tool:
```
# python3 graver.py -t <target_url> -p <target_port>
```
Simple example with returned output:
```
# python3 graver.py -t http://www.mygrav.local -p 8000
RCE payload injected, now visit the malicious page at 'http://www.mygrav.local:8000/hacked_r79b?do='
```
![image](https://github.com/akabe1/Graver/assets/46047144/c6d478f2-573e-49ed-93bf-92a8e3dd3c5d)
# Author
graver was developed by Maurizio Siddu
# GNU License
Copyright (c) 2024 graver
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>