## https://sploitus.com/exploit?id=EC7D8205-6B29-58CA-9D70-061ABA63BBAE
# CVE-2024-10924-Exploit
Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass
# ๐ Description
This script exploits a vulnerability in the Really Simple Security plugin (versions 9.0.0 - 9.1.1.1) for WordPress.The flaw allows authentication bypass due to improper error handling in the `check_login_and_get_user` function in the Two-Factor Authentication API.
Using this exploit, an attacker can log in as any user (e.g., administrator) if 2FA is enabled.Once authenticated, the script automatically launches a browser session with the obtained session cookies.
## ๐ Requirements
Before running the script, install the required dependencies:
```
pip install requests selenium webdriver-manager
```
## ๐ How to Use
```
python CVE-2024-10924.py -u http://TARGET-WEBSITE.com/
```
- The script exploits the authentication bypass vulnerability to obtain valid session cookies.
- It launches Chrome automatically and opens the WordPress dashboard as an administrator.
## ๐ How It Works
1. Exploits CVE-2024-10924 by sending a POST request to:
```
/wp-json/reallysimplessl/v1/two_fa/skip_onboarding
```
2. Extracts session cookies from the response.
3. Launches Google Chrome via Selenium.
4. Injects the cookies into the browser session.
5. Redirects to `/wp-admin/`, granting administrator access without needing a password.
## Usage:
```
usage: CVE-2024-10924.py [-h] -u URL
WordPress Login Exploit | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication
Bypass
options:
-h, --help show this help message and exit
-u URL, --url URL Target WordPress URL
```
### Disclaimer
This script is intended for educational purposes and authorized security assessments only. Misuse of this script may result in legal consequences. Always obtain proper authorization before testing on any system.