Files
metasploit-gs/documentation/modules/exploit
Chocapikk 1d7cffbdac Refactored exploit module based on RCESecurity's analysis of CVE-2024-5932
- Completely overhauled the method for exploiting the GiveWP plugin by removing dependency on the REST API, which may require authentication.
- Instead, we now use the admin-ajax.php endpoint for retrieving form lists and nonce values, ensuring compatibility even when REST API authentication is required.
- The exploit now works with all form types; however, the give_price_id and give_amount must be set to '0' and '0.00', respectively, as attempts to randomize these values caused the exploit to fail.
2024-08-27 22:15:12 +02:00
..
2023-10-10 14:46:18 -04:00
2023-10-10 14:46:18 -04:00
2024-06-14 11:02:31 -07:00
2023-10-10 14:46:18 -04:00
2023-10-10 14:46:18 -04:00
2023-08-09 00:24:53 -05:00