Skip to content

Commit 6350525

Browse files
author
Offensive Security
committed
DB: 2022-04-23
2 changes to exploits/shellcodes
1 parent 093714d commit 6350525

File tree

2 files changed

+10
-1
lines changed

2 files changed

+10
-1
lines changed

exploits/multiple/webapps/50542.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
# Vendor Homepage: https://softwell.com.br/
66
# Version: 3.6.0.42
77
# Tested on: Kali Linux 2021.3
8+
# CVE: CVE-2021-43650
89

910
=-=-=-= Description =-=-=-=
1011

exploits/php/webapps/50882.py

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,15 @@
3939
# The file we upload must have the following structure:
4040
# 1. It must be a ZIP file. You can name it as you want.
4141
# 2. It must contain a folder called "elementor-pro"
42-
# 3. This folder must contain a file named "elementor-pro.php"
42+
# 3. This folder must contain a file named "elementor-pro.php"# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else)
43+
# 4. The payload must contain AT LEAST the plugin name, otherwise WordPress will NOT accept it and the upload will FAIL
44+
# e.g.
45+
# <?php
46+
# /**
47+
# * Plugin Name: Elementor Pro
48+
# */
49+
# // Actual PHP payload
50+
# ?>
4351
# This file will be YOUR payload (e.g. PHP Reverse Shell or anything else)
4452
#
4553
# WARNING: The fake plugin we upload will be activated by Elementor, this means that each time we visit any page we trigger our payload.

0 commit comments

Comments
 (0)