Code Monkey home page Code Monkey logo

ssi-cve-2022-21661's Introduction

SSI-CVE-2022-21661

Information System's Security 2nd Assignment

Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 5.8.3.

Configuring the environment

To start and configure the environment, you should just run:

docker-compose run --rm wordpress-cli

Requirements

  • Docker
  • Docker-Compose
  • Python 3.9+
  • Argparser
  • Hashcat

Running some examples

In example.md file, you can follow a little tutorial with some examples to get started with the exploit of this vulnerability.

The exploit itself

First of all, ensure the file we're going to execute has execution permission. So run the following command.

chmod +x exploit.py

Then, to run the exploit, you should run the following command replacing the <payload> with:

  1. Dump database name.
  2. Dump users table.
./exploit.py http://127.0.0.1:8000/wp-admin/admin-ajax.php [payload] [-l LIMIT_USER] [-o output]

Going further

For going a little bit further, We prepared a script that runs our exploit and uses the data from the user's table, and, then, tries to recover the original passwords forcing a dictionary attack through hashcat.

For this attack, we are using the dictionary rockyou.txt.

To execute it, just make sure it has execution permissions and runs it.

chmod +x experiment.sh
./experiment.sh

It can take a while... In the end, you're able to see the file results/users.txt with the users and raw passwords.

Report

You can find a complete report, in French, of this assignment in the file Devoir_Securit__2.pdf.

Authors

  • Leonardo Monteiro
  • Wellington Machado de Espindula
  • Bassam Graini

Exploit References

ssi-cve-2022-21661's People

Contributors

wellingtonespindula avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

Forkers

eurosadler

ssi-cve-2022-21661's Issues

Bad Request 400

Hello

I really appreciate you having made a laboratory available for this CVE, but I'm having a problem with the request and the response returns code 400, would you have any guidance?

image

Thankyou

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.