Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2022-1329 PoC — Elementor Website Builder 3.6.0 - 3.6.2 - Missing Authorization to Remote Code Execution

Source
Associated Vulnerability
Title:Elementor Website Builder 3.6.0 - 3.6.2 - Missing Authorization to Remote Code Execution (CVE-2022-1329)
Description:The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
Readme
��# CVE-2022-1329 >ؠ�



<div style="display: flex; justify-content: space-around;">

  <img src="https://img.shields.io/badge/Wordpress-6.1.1-green?labelColor=21759b&style=for-the-badge&logo=Wordpress" alt="Wordpress">

  <img src="https://img.shields.io/badge/Elementor-3.6.1-green?labelColor=92003b&style=for-the-badge&logo=elementor" alt="Elementor">

  <img src="https://img.shields.io/badge/Ubuntu-20.04-green?labelColor=56347c&style=for-the-badge&logo=Ubuntu" alt="Ubuntu">

  <img src="https://img.shields.io/badge/Kernel-5.9.12-green?labelColor=ff0000&style=for-the-badge&logo=kernel&logoColor=green" alt="Kernel">

</div>

<br><br>



Este proyecto contiene la documentaci�n y pasos necesarios para realizar la explotaci�n de la vulnerabilidad **CVE-2022-1329** en un entorno donde previamente se ha instalado **WordPress** en una m�quina **Ubuntu 20.04**. Adem�s, incluye las instrucciones para cambiar la versi�n del Kernel de la m�quina a **5.9.12** con el fin de aprovechar la vulnerabilidad **Dirty Pipe** (**CVE-2022-0847**) y as� escalar privilegios en el sistema.



## Contenidos:



- Instalaci�n y configuraci�n de WordPress en Ubuntu 20.04.

- Cambio de versi�n del Kernel a **5.9.12**, que es vulnerable a "Dirty Pipe".

- Explotaci�n de **CVE-2022-1329** en WordPress.

- Uso de la vulnerabilidad Dirty Pipe para escalar privilegios en la m�quina.



## Prerrequisitos



Antes de comenzar, aseg�rate de cumplir con los siguientes requisitos:



- **Ubuntu 20.04** instalado en la m�quina v�ctima.

- Acceso de administrador a la m�quina para modificar el Kernel.

- Conexi�n a internet para descargar paquetes y actualizar el sistema.

- Permisos para instalar WordPress y configurarlo.

File Snapshot

[4.0K] /data/pocs/5f70da805b1ada9920779359d0b524517b9b9d75 ├── [5.1K] Anexo1.md ├── [1.9K] Anexo2.md ├── [ 17K] CVE-2022-1329.md ├── [4.0K] img │   ├── [213K] mainline1.png │   ├── [103K] mainline2.png │   ├── [ 93K] mainline3.png │   ├── [ 40K] mainline4.png │   ├── [ 59K] metasploit.png │   ├── [ 97K] plugins1.png │   ├── [148K] plugins2.png │   └── [111K] wordpress.png └── [3.3K] README.md 1 directory, 12 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →