Skip to content

Conversation

@wchen-r7
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

WPVULNDB Reference to add:
https://wpvulndb.com/vulnerabilities/7679
(other references are also linked on wpvulndb if you want to add them)

@espreto
Copy link
Owner

espreto commented Oct 17, 2015

Tks @wchen-r7 👍

@all3g Unfortunately this is not working for me. I'm using the vulnerable software you indicated.

exploit(wp_cm_download_manager_exec)  exploit 

[*] Started reverse handler on 10.10.10.10:4444 
[*] 10.10.10.20:80 - Uploading payload
[*] The server returned: 200 OK
[*] Exploit completed, but no session was created.

@nixawk
Copy link

nixawk commented Oct 18, 2015

Pleaes try http://demo-target/wordpress/cmdownloads/?CMDsearch=%22.phpinfo%28%29.%22 in your browser. It's ok for me.

@nixawk
Copy link

nixawk commented Oct 18, 2015

Please check "WordPress Address (URL)" and "Site Address (URL)" in general settings, wordpress site should be accessed by others.

cm_download_manager

cm_download_manager_msfexploit

@espreto
Copy link
Owner

espreto commented Oct 18, 2015

@all3g Yeah! Thank you! I will try again this week. :)

@espreto
Copy link
Owner

espreto commented Jun 14, 2016

@join-us I'm sorry for the long delay. I'm back. I'll test again. Thank you. :)

@nixawk
Copy link

nixawk commented Jun 14, 2016

@wchen-r7 Pleae see the pr given by me.

  • add wpvulndb reference url
  • use MetasploitModule as a class name

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants