sc1 - Copy (2)
sc1 - Copy (2)
ChatGPT
To use this exploit for Pluck CMS 4.7.13 File Upload Remote Code Execution
(Authenticated), follow these steps carefully. Remember, this is for ethical purposes only,
such as testing systems you own or have permission to test.
Requirements:
Steps:
bash
Копировать код
python3 pluck_exploit.py <target_ip> <target_port> <admin_password>
<pluckcmspath>
3. Authentication:
o The script will authenticate using the provided admin password and generate a
session cookie.
o If authentication fails, ensure the credentials are correct.
4. Webshell Upload:
o The script uploads a PHP webshell (shell.phar) to the target system using
the "Manage Files" feature in Pluck CMS.
o Once uploaded, the webshell should be accessible on the server.
5. Access the Webshell:
o Visit the uploaded shell's URL on the target system. For example:
php
Копировать код
http://<target_ip>:<target_port><pluckcmspath>/data/shell.phar
Important Notes:
Replace the shell payload (p0wny-shell) with a custom or more suitable shell if
necessary.
Verify Permissions: Ensure you have explicit permission to perform this test to
comply with ethical guidelines and laws.
Clean up after testing: Remove the webshell and any modifications made during the
test to restore the system.
If you need assistance with payload customization or additional steps, feel free to ask.
4o