Share
## https://sploitus.com/exploit?id=802AD692-2B0A-5D9B-A02E-F3FB90806F82
# EN
A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites. This tool helps identify and exploit the vulnerability by scanning a list of target URLs and attempting a specific payload to determine if the site is vulnerable.
## Features
- **Automatic Vulnerability Scanning**: Scans target URLs for CVE-2024-5522 vulnerability.
- **Custom Payload Support**: Uses a payload from a file for the vulnerability check.
## Installation
1. Clone the repository:
```bash
git clone https://github.com/geniuszly/CVE-2024-5522
```
2. Navigate to the directory:
```bash
cd CVE-2024-5522
```
3. Install the required Python packages:
```bash
pip install -r requirements.txt
```
## Usage
1. **Prepare a target list**: Create a text file containing the URLs of WordPress sites you wish to scan. Each URL should be on a new line.
2. **Run the scanner**:
```bash
python3 main.py
```
You will be prompted to enter the path to your target list file. The tool will then start scanning each target for the CVE-2024-5522 vulnerability using the provided payload.
3. **Interpreting the results**:
The output will be color-coded:
- **Green**: Target is vulnerable.
- **Red**: Target is not vulnerable or an error occurred.
## Example output
```
______ _______ ____ ___ ____ _ _ ____ ____ ____ ____
/ ___\ \ / / ____| |___ \ / _ \___ \| || | | ___| ___|___ \|___ \
| | \ \ / /| _| _____ __) | | | |__) | || |_ ____|___ \___ \ __) | __) |
| |___ \ V / | |__|_____/ __/| |_| / __/|__ _|_____|__) |__) / __/ / __/
\____| \_/ |_____| |_____|\___/_____| |_| |____/____/_____|_____|
CVE-2024-5522 Exploit Scanner
developed by geniuszly
ΠΠ²Π΅Π΄ΠΈΡΠ΅ ΠΏΡΡΡ ΠΊ ΡΠΏΠΈΡΠΊΡ ΡΠ΅Π»Π΅ΠΉ: targets.txt
[Π‘ΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ http://example.com]
[-] http://example.com Π½Π΅ ΡΡΠ·Π²ΠΈΠΌΠ°.
[Π‘ΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ http://vulnerable-site.com]
[+] Π¦Π΅Π»Ρ ΡΡΠ·Π²ΠΈΠΌΠ°! :D http://vulnerable-site.com
[Π‘ΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ http://another-site.com]
[!] ΠΡΠΈΠ±ΠΊΠ° ΠΏΠΎΠ΄ΠΊΠ»ΡΡΠ΅Π½ΠΈΡ ΠΊ http://another-site.com: Connection timeout
[Π£ΡΠ·Π²ΠΈΠΌΡΠ΅ URL-Π°Π΄ΡΠ΅ΡΠ°]
[+] http://vulnerable-site.com/wp-json/h5vp/v1/video/0?id=-1'...
```
## Payload
The payload used for the exploitation is stored in `payload.txt`. You can customize or modify this file as needed.
## Disclaimer
This tool is intended for educational purposes and ethical security testing only. Unauthorized use of this tool against targets without explicit permission is illegal and strictly prohibited.
# RU
PoC-ΡΠΊΡΠΏΠ»ΠΎΠΉΡ ΡΠΊΠ°Π½Π΅Ρ Π΄Π»Ρ ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ CVE-2024-5522 Π½Π° Π²Π΅Π±-ΡΠ°ΠΉΡΠ°Ρ
WordPress. ΠΡΠΎΡ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½Ρ ΠΏΠΎΠΌΠΎΠ³Π°Π΅Ρ ΠΎΠΏΡΠ΅Π΄Π΅Π»ΠΈΡΡ ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΡ ΠΏΡΡΠ΅ΠΌ ΡΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΏΠΈΡΠΊΠ° ΡΠ΅Π»Π΅Π²ΡΡ
URL-Π°Π΄ΡΠ΅ΡΠΎΠ² ΠΈ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΠΎΠΉ ΠΏΠΎΠ»Π΅Π·Π½ΠΎΠΉ Π½Π°Π³ΡΡΠ·ΠΊΠΈ Π΄Π»Ρ ΠΏΡΠΎΠ²Π΅ΡΠΊΠΈ, ΠΏΠΎΠ΄Π²Π΅ΡΠΆΠ΅Π½ Π»ΠΈ ΡΠ°ΠΉΡ Π°ΡΠ°ΠΊΠ΅.
## ΠΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠΈ
- **ΠΠ²ΡΠΎΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΡΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ Π½Π° ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΡ**: Π‘ΠΊΠ°Π½ΠΈΡΡΠ΅Ρ ΡΠ΅Π»Π΅Π²ΡΠ΅ URL-Π°Π΄ΡΠ΅ΡΠ° Π½Π° ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΡ CVE-2024-5522.
- **ΠΠΎΠ΄Π΄Π΅ΡΠΆΠΊΠ° ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΡΡΠΊΠΎΠΉ ΠΏΠΎΠ»Π΅Π·Π½ΠΎΠΉ Π½Π°Π³ΡΡΠ·ΠΊΠΈ**: ΠΡΠΏΠΎΠ»ΡΠ·ΡΠ΅Ρ ΠΏΠΎΠ»Π΅Π·Π½ΡΡ Π½Π°Π³ΡΡΠ·ΠΊΡ ΠΈΠ· ΡΠ°ΠΉΠ»Π° Π΄Π»Ρ ΠΏΡΠΎΠ²Π΅ΡΠΊΠΈ ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ.
## Π£ΡΡΠ°Π½ΠΎΠ²ΠΊΠ°
1. ΠΠ»ΠΎΠ½ΠΈΡΡΠΉΡΠ΅ ΡΠ΅ΠΏΠΎΠ·ΠΈΡΠΎΡΠΈΠΉ:
```bash
git clone https://github.com/geniuszly/CVE-2024-5522
```
2. ΠΠ΅ΡΠ΅ΠΉΠ΄ΠΈΡΠ΅ Π² ΠΏΠ°ΠΏΠΊΡ ΠΏΡΠΎΠ΅ΠΊΡΠ°:
```bash
cd CVE-2024-5522
```
3. Π£ΡΡΠ°Π½ΠΎΠ²ΠΈΡΠ΅ Π½Π΅ΠΎΠ±Ρ
ΠΎΠ΄ΠΈΠΌΡΠ΅ Python ΠΏΠ°ΠΊΠ΅ΡΡ:
```bash
pip install -r requirements.txt
```
## ΠΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅
1. **ΠΠΎΠ΄Π³ΠΎΡΠΎΠ²ΡΡΠ΅ ΡΠΏΠΈΡΠΎΠΊ ΡΠ΅Π»Π΅ΠΉ**: Π‘ΠΎΠ·Π΄Π°ΠΉΡΠ΅ ΡΠ΅ΠΊΡΡΠΎΠ²ΡΠΉ ΡΠ°ΠΉΠ», ΡΠΎΠ΄Π΅ΡΠΆΠ°ΡΠΈΠΉ URL-Π°Π΄ΡΠ΅ΡΠ° ΡΠ°ΠΉΡΠΎΠ² WordPress, ΠΊΠΎΡΠΎΡΡΠ΅ Π²Ρ Ρ
ΠΎΡΠΈΡΠ΅ ΠΏΡΠΎΡΠΊΠ°Π½ΠΈΡΠΎΠ²Π°ΡΡ. ΠΠ°ΠΆΠ΄ΡΠΉ URL-Π°Π΄ΡΠ΅Ρ Π΄ΠΎΠ»ΠΆΠ΅Π½ Π±ΡΡΡ Π½Π° Π½ΠΎΠ²ΠΎΠΉ ΡΡΡΠΎΠΊΠ΅.
2. **ΠΠ°ΠΏΡΡΡΠΈΡΠ΅ ΡΠΊΠ°Π½Π΅Ρ**:
```bash
python3 main.py
```
ΠΠ°Ρ ΠΏΠΎΠΏΡΠΎΡΡΡ Π²Π²Π΅ΡΡΠΈ ΠΏΡΡΡ ΠΊ ΡΠ°ΠΉΠ»Ρ ΡΠΎ ΡΠΏΠΈΡΠΊΠΎΠΌ ΡΠ΅Π»Π΅ΠΉ. ΠΠ½ΡΡΡΡΠΌΠ΅Π½Ρ Π½Π°ΡΠ½Π΅Ρ ΡΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΠΊΠ°ΠΆΠ΄ΠΎΠΉ ΡΠ΅Π»ΠΈ Π½Π° ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΡ CVE-2024-5522, ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΡ ΠΏΡΠ΅Π΄ΠΎΡΡΠ°Π²Π»Π΅Π½Π½ΡΡ ΠΏΠΎΠ»Π΅Π·Π½ΡΡ Π½Π°Π³ΡΡΠ·ΠΊΡ.
3. **ΠΠ½ΡΠ΅ΡΠΏΡΠ΅ΡΠ°ΡΠΈΡ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠΎΠ²**:
Π Π΅Π·ΡΠ»ΡΡΠ°ΡΡ Π±ΡΠ΄ΡΡ ΡΠ²Π΅ΡΠ½ΡΠΌΠΈ:
- **ΠΠ΅Π»Π΅Π½ΡΠΉ**: Π¦Π΅Π»Ρ ΡΡΠ·Π²ΠΈΠΌΠ°.
- **ΠΡΠ°ΡΠ½ΡΠΉ**: Π¦Π΅Π»Ρ Π½Π΅ ΡΡΠ·Π²ΠΈΠΌΠ° ΠΈΠ»ΠΈ ΠΏΡΠΎΠΈΠ·ΠΎΡΠ»Π° ΠΎΡΠΈΠ±ΠΊΠ°.
## ΠΡΠΈΠΌΠ΅Ρ Π²ΡΠ²ΠΎΠ΄Π°
```
______ _______ ____ ___ ____ _ _ ____ ____ ____ ____
/ ___\ \ / / ____| |___ \ / _ \___ \| || | | ___| ___|___ \|___ \
| | \ \ / /| _| _____ __) | | | |__) | || |_ ____|___ \___ \ __) | __) |
| |___ \ V / | |__|_____/ __/| |_| / __/|__ _|_____|__) |__) / __/ / __/
\____| \_/ |_____| |_____|\___/_____| |_| |____/____/_____|_____|
CVE-2024-5522 Exploit Scanner
developed by geniuszly
ΠΠ²Π΅Π΄ΠΈΡΠ΅ ΠΏΡΡΡ ΠΊ ΡΠΏΠΈΡΠΊΡ ΡΠ΅Π»Π΅ΠΉ: targets.txt
[Π‘ΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ http://example.com]
[-] http://example.com Π½Π΅ ΡΡΠ·Π²ΠΈΠΌΠ°.
[Π‘ΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ http://vulnerable-site.com]
[+] Π¦Π΅Π»Ρ ΡΡΠ·Π²ΠΈΠΌΠ°! :D http://vulnerable-site.com
[Π‘ΠΊΠ°Π½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ http://another-site.com]
[!] ΠΡΠΈΠ±ΠΊΠ° ΠΏΠΎΠ΄ΠΊΠ»ΡΡΠ΅Π½ΠΈΡ ΠΊ http://another-site.com: Connection timeout
[Π£ΡΠ·Π²ΠΈΠΌΡΠ΅ URL-Π°Π΄ΡΠ΅ΡΠ°]
[+] http://vulnerable-site.com/wp-json/h5vp/v1/video/0?id=-1'...
```
## ΠΠΎΠ»Π΅Π·Π½Π°Ρ Π½Π°Π³ΡΡΠ·ΠΊΠ°
ΠΠΎΠ»Π΅Π·Π½Π°Ρ Π½Π°Π³ΡΡΠ·ΠΊΠ°, ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΠ°Ρ Π΄Π»Ρ ΡΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΠΈΠΈ, Ρ
ΡΠ°Π½ΠΈΡΡΡ Π² ΡΠ°ΠΉΠ»Π΅ `payload.txt`. ΠΡΠΈ Π½Π΅ΠΎΠ±Ρ
ΠΎΠ΄ΠΈΠΌΠΎΡΡΠΈ Π²Ρ ΠΌΠΎΠΆΠ΅ΡΠ΅ Π½Π°ΡΡΡΠΎΠΈΡΡ ΠΈΠ»ΠΈ ΠΈΠ·ΠΌΠ΅Π½ΠΈΡΡ Π΅Π³ΠΎ.
## ΠΡΠΊΠ°Π· ΠΎΡ ΠΎΡΠ²Π΅ΡΡΡΠ²Π΅Π½Π½ΠΎΡΡΠΈ
ΠΡΠΎΡ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½Ρ ΠΏΡΠ΅Π΄Π½Π°Π·Π½Π°ΡΠ΅Π½ ΠΈΡΠΊΠ»ΡΡΠΈΡΠ΅Π»ΡΠ½ΠΎ Π΄Π»Ρ ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΡΡ
ΡΠ΅Π»Π΅ΠΉ ΠΈ ΡΡΠΈΡΠ½ΠΎΠ³ΠΎ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ. ΠΠ΅ΡΠ°Π½ΠΊΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½Π½ΠΎΠ΅ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ ΡΡΠΎΠ³ΠΎ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ° ΠΏΡΠΎΡΠΈΠ² ΡΠ΅Π»Π΅ΠΉ Π±Π΅Π· ΡΠ²Π½ΠΎΠ³ΠΎ ΡΠ°Π·ΡΠ΅ΡΠ΅Π½ΠΈΡ Π½Π΅Π·Π°ΠΊΠΎΠ½Π½ΠΎ ΠΈ ΡΡΡΠΎΠ³ΠΎ Π·Π°ΠΏΡΠ΅ΡΠ΅Π½ΠΎ.