Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-9787 PoC — WordPress 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:WordPress 跨站请求伪造漏洞 (CVE-2019-9787)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress 5.1.1之前版本中存在安全漏洞,该漏洞源于程序没有正确地过滤评论内容。远程攻击者可利用该漏洞执行代码并控制WordPress网站。
Readme
# CVE-2019-9787 CSRF PoC

## Overview
PoC of CVE-2019-9787 CSRF    
WordPress Version 5.0    
[refference](https://blog.ripstech.com/2019/wordpress-csrf-to-rce/)

Do not use this except for test purpose.

## Installation

```
$ docker-compose up -d
```

1. access http://localhost:8080/ and install WordPress. you only have to create WP admin account.   
2. access http://localhost:8080/?p=1#comments as a visitor, and post comment like "csrf site: http://localhost/".   
![comment ex](https://github.com/rkatogit/cve-2019-9787_csrf_poc/blob/images/1.png)


## Test
click the link posted at 2.    
![comment ex](https://github.com/rkatogit/cve-2019-9787_csrf_poc/blob/images/2.png)

you'll see the comment "csrf success" is posted by user you currently logged in.


File Snapshot

[4.0K] /data/pocs/05dfdd7b1883e2cd09609c331f68e0b8350231f6 ├── [ 689] docker-compose.yml ├── [4.0K] nginx │   ├── [ 262] iframe-post.html │   └── [ 105] index.html └── [ 766] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.