Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remote Code Execution is not working! #3

Open
c-malitia opened this issue Sep 9, 2024 · 1 comment
Open

Remote Code Execution is not working! #3

c-malitia opened this issue Sep 9, 2024 · 1 comment

Comments

@c-malitia
Copy link

When i try to run a netcat reverse shell command or a simple whoami command it did not work.

image

image

Also in the demo video it shows when the exploit successfully executed it shows as Exploited. Whereas i don't find any print command in the code which print Exploited after the successful execution of the exploit.

@EQSTLab
Copy link
Owner

EQSTLab commented Sep 11, 2024

This issue occurs for the following reasons.

  1. For vulnerabilities that run in blind format, you can't get results by just typing commands. Try testing with OAST (Out-of-Band Application Security Testing) using a combination of "curl" and "Linux commands".
  2. WordPress images don't have netcat-traditional installed by default, so you can't run the nc command with the e option. Try installing netcat-traditional manually on your image or utilize a php command to connect a reverse shell.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants