You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/multi/http/wondercms_rce.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@
12
12
1. Install the application
13
13
2. Start msfconsole
14
14
3. Do: `use multi/http/wondercms_rce`
15
-
4. Do: `set PASSWORD [password]'
15
+
4. Do: `set PASSWORD [password]`
16
16
5. Do: `set LHOST [attacker IP]`
17
17
6. Do: `set LPORT [attacker PORT]`
18
18
4. Do: `run`
@@ -22,7 +22,7 @@
22
22
23
23
### PASSWORD
24
24
25
-
WonderCMS generates one global password that gets generated upon first run of application. This is global admin password that controls the whole CMS. This password has to be used in the exploit to get authenticated access.
25
+
WonderCMS uses a global password that generated at the application's first run. This is global admin password that controls the whole CMS. This password has to be used in the exploit to get authenticated access.
Copy file name to clipboardExpand all lines: modules/exploits/multi/http/wondercms_rce.rb
+12-7Lines changed: 12 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -19,13 +19,18 @@ def initialize(info = {})
19
19
info,
20
20
'Name'=>'WonderCMS Remote Code Execution',
21
21
'Description'=>%q{
22
-
This module adds exploit for CVE-2023-41425. The WonderCMS is simple, free and open-source management system. It contains file upload vulnerability in version 3.2.0 up to version 3.4.2, which allows authenticated users to upload malicious zip file, which gets parsed into theme directory. This vulnerability can be used to upload malicious PHP file.
22
+
This module exploits CVE-2023-41425, an authenticated file upload vulnerability affecting WonderCMS between 3.2.0 and 3.4.2.
returnExploit::CheckCode::Unknown('Unable to get version')unlessversion
104
109
105
-
returnMsf::Exploit::CheckCode::Safe("WonderCMS #{version} is not affected")unlessversion <= Rex::Version.new('3.4.2') && version >= Rex::Version.new('3.2.0')
110
+
returnMsf::Exploit::CheckCode::Safe("WonderCMS #{version} is not affected")ifversion.between?(Rex::Version.new('3.4.2'),Rex::Version.new('3.2.0'))
106
111
107
112
returnExploit::CheckCode::Vulnerable("Version #{version} is affected")
0 commit comments