Exploit for CVE-2023-47504.
According to NIST, this vulnerability should allow unauthenticated users to access functionalities in the Elementor Website Builder Plugin.
Based on my research into the vulnerability, and also judging by the URL from Patchstack that describes the vulnerability: https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-16-4-contributor-arbitrary-attachment-read-vulnerability?_s_id=cve
, I recon this is actually requires credentials for at least a subscriber account.
Also, for the exploit to work one needs access to the wp-config.php
file of the target website.
- Credentials for at least a subscriber account
- Access to
wp-config.php
- Authorization to exploit the website ;)
- Proxy your traffic to burp, or use the browser's developers tool to intercept requests;
- Go to
wp-admin/profile.php
and update your profile; - Get the
wordpress_logged_in_*
cookie and your user id from the request; - The required salt is the NONCE_KEY + NONCE_SALT string from
wp-config.php
python exploit.py --target <TARGET> --wordpress-cookie <COPIED COOKIE> --uid <COPIED USER ID> --salt <COPIED SALT>
;- If the target is vulnerable the elementor cache of the website will be deleted (files under
/wp-content/uploads/elementor/css
);