CVE-2020-24186
The target WordPress instance has a vulnerable version of the wpdiscuz plugin installed; 7.0.4
A vulnerability has been found in gVectors wpDiscuz Plugin 7.0.0/7.0.1/7.0.2/7.0.3/7.0.4 on WordPress (WordPress Plugin) and classified as critical. This vulnerability affects the function
wmuUploadFiles
. The manipulation as part of a PHP File leads to a code injection vulnerability. The CWE definition for the vulnerability is CWE-94. The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. As an impact it is known to affect confidentiality, integrity, and availability.
Exploit
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/blogger]
└─$ searchsploit -m php/webapps/49967.py ; mv 49967.py CVE-2020-24186.py
Exploit: WordPress Plugin wpDiscuz 7.0.4 - Remote Code Execution (Unauthenticated)
URL: https://www.exploit-db.com/exploits/49967
Path: /usr/share/exploitdb/exploits/php/webapps/49967.py
Codes: CVE-2020-24186
Verified: False
File Type: Python script, Unicode text, UTF-8 text executable, with very long lines (864)
Copied to: /home/kali/PEN-200/PG_PLAY/blogger/49967.py
Exploit locally available