# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本 | https://github.com/iSee857/CVE-2024-9047-PoC | POC详情 |
2 | POC - WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11 | https://github.com/verylazytech/CVE-2024-9047 | POC详情 |
3 | Exploit for WordPress File Upload Plugin - All versions up to 4.24.11 are vulnerable. | https://github.com/Nxploited/CVE-2024-9047-Exploit | POC详情 |
4 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/chihyeonwon/CVE-2024-9047 | POC详情 |
5 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/mr-won/CVE-2024-9047 | POC详情 |
6 | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9047.yaml | POC详情 |
7 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/user20252228/CVE-2024-9047 | POC详情 |
标题: WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php -- 🔗来源链接
标签:
神龙速读标题: Changeset 3164449 for wp-file-upload – WordPress Plugin Repository -- 🔗来源链接
标签: