Skip to content

This Python script exploits the Gila CMS 1.10.9 vulnerability to achieve authenticated remote code execution (RCE). It uploads a shell, allowing arbitrary command execution on the target system. The exploit requires the target login URL, email, password, local IP, and port. It is for educational purposes only.

Notifications You must be signed in to change notification settings

omershaik0/Gila-CMS-1.10.9-RCE-Authenticated

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Gila CMS 1.10.9 - Remote Code Execution (RCE) (Authenticated)

Description:

This Python script exploits the Gila CMS 1.10.9 vulnerability to achieve authenticated remote code execution (RCE). It uploads a shell, allowing arbitrary command execution on the target system. The exploit requires the target login URL, email, password, local IP, and port. It is for educational purposes only.

By Unknown_Exploit

ExploitDB:

Exploit Brief:

Usage:

  1. Enter the target login URL, including the "http://" or "https://" prefix.
  2. Provide the email and password for authentication.
  3. Enter the local IP (LHOST) and port (LPORT) for setting up the reverse shell connection.

Exploit Execution

Reverse Shell

About

This Python script exploits the Gila CMS 1.10.9 vulnerability to achieve authenticated remote code execution (RCE). It uploads a shell, allowing arbitrary command execution on the target system. The exploit requires the target login URL, email, password, local IP, and port. It is for educational purposes only.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages