[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wolf CMS 0.8.3.1 - Remote Code Execution Vulnerability

Author
Ahmet Ümit BAYRAM
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-38657
Category
web applications
Date add
05-05-2023
Platform
php
# Exploit Title: Wolf CMS 0.8.3.1 - Remote Code Execution (RCE)
# Exploit Author: Ahmet Ümit BAYRAM
# Vendor Homepage: https://wolf-cms.readthedocs.io
# Software Link: https://github.com/wolfcms/wolfcms
# Version: 0.8.3.1
# Tested on: Kali Linux

### Steps to Reproduce ###

# Firstly, go to the "Files" tab.
# Click on the "Create new file" button and create a php file (e.g:
shell.php)
# Then, click on the file you created to edit it.
# Now, enter your shell code and save the file.
# Finally, go to https://localhost/wolfcms/public/shell.php

### There's your shell! ###

#  0day.today [2024-09-28]  #