Skip to content

ilikeoyt/Jpress-v5.1.1-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

Jpress-v5.1.1-exploit

  1. Download v5.1.1 of Jpress. image
  2. First insert the malicious code in HelloWorldAddonController. image
  3. The plugin is then compiled into a jar package. image image
  4. Upload the jar package to the plugin directory. image
  5. Visit /admin/addon/test and the malicious code is executed. image

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published