Skip to content

m3ssap0/wordpress-really-simple-security-authn-bypass-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

wordpress-really-simple-security-authn-bypass-exploit

This is a Python3 program that exploits Really Simple Security < 9.1.2 authentication bypass vulnerability (CVE-2024-10924).

DISCLAIMER

This tool is intended for security engineers and appsec people for security assessments. Please use this tool responsibly. I do not take responsibility for the way in which any one uses this application. I am NOT responsible for any damages caused or any crimes committed by using this tool.

Vulnerability info

Help

$ ./exploit.py --help
usage: exploit.py [-h] -t TARGET [-uid USER_ID] [-v]

Exploit for Really Simple Security < 9.1.2 authentication bypass vulnerability (CVE-2024-10924). - v1.0 (2024-11-19)

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        URL of the target WordPress
  -uid USER_ID, --user-id USER_ID
                        Victim user ID (1 is usually the admin).
  -v, --verbose         verbose mode

Examples

./exploit.py -t http://localhost:1337
./exploit.py -t http://localhost:1337 -uid 1 -v

Vulnerable application

A vulnerable application can be setup using this repository.

Authors

  • Antonio Francesco Sardella - implementation - m3ssap0

License

See the LICENSE file for details.

Acknowledgments

  • István Márton, the security researcher who discovered the vulnerability.

Releases

No releases published

Packages

No packages published

Languages