File tree Expand file tree Collapse file tree 2 files changed +10
-1
lines changed Expand file tree Collapse file tree 2 files changed +10
-1
lines changed Original file line number Diff line number Diff line change 5
5
# Vendor Homepage: https://softwell.com.br/
6
6
# Version: 3.6.0.42
7
7
# Tested on: Kali Linux 2021.3
8
+ # CVE: CVE-2021-43650
8
9
9
10
=-=-=-= Description =-=-=-=
10
11
Original file line number Diff line number Diff line change 39
39
# The file we upload must have the following structure:
40
40
# 1. It must be a ZIP file. You can name it as you want.
41
41
# 2. It must contain a folder called "elementor-pro"
42
- # 3. This folder must contain a file named "elementor-pro.php"
42
+ # 3. This folder must contain a file named "elementor-pro.php"# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else)
43
+ # 4. The payload must contain AT LEAST the plugin name, otherwise WordPress will NOT accept it and the upload will FAIL
44
+ # e.g.
45
+ # <?php
46
+ # /**
47
+ # * Plugin Name: Elementor Pro
48
+ # */
49
+ # // Actual PHP payload
50
+ # ?>
43
51
# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else)
44
52
#
45
53
# WARNING: The fake plugin we upload will be activated by Elementor, this means that each time we visit any page we trigger our payload.
You can’t perform that action at this time.
0 commit comments