Files
metasploit-gs/documentation/modules/exploit/multi
Chocapikk 1d7cffbdac Refactored exploit module based on RCESecurity's analysis of CVE-2024-5932
- Completely overhauled the method for exploiting the GiveWP plugin by removing dependency on the REST API, which may require authentication.
- Instead, we now use the admin-ajax.php endpoint for retrieving form lists and nonce values, ensuring compatibility even when REST API authentication is required.
- The exploit now works with all form types; however, the give_price_id and give_amount must be set to '0' and '0.00', respectively, as attempts to randomize these values caused the exploit to fail.
2024-08-27 22:15:12 +02:00
..
2018-04-03 13:52:02 -05:00
2023-05-24 13:17:49 -05:00
2024-08-02 15:43:26 +01:00
2023-10-10 14:46:18 -04:00
2023-10-10 14:46:18 -04:00
2021-03-25 17:07:20 +03:00
2023-10-10 14:46:18 -04:00