支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 0610bf5ddb56187badfa44eb14e7b4b3160bf65d

来源
关联漏洞
标题:WordPress theme Epsilon Framework 代码注入漏洞 (CVE-2020-36708)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress theme是WordPress的一款主题。 WordPress theme Epsilon Framework存在代码注入漏洞,该漏洞源于易受函数注入攻击。
Description
Proof of concept for CVE-2020-36708
介绍
# CVE-2020-36708 – WordPress Epsilon Framework Function Injection PoC

## Overview
**CVE-2020-36708** is a vulnerability in the **Epsilon Framework** for WordPress that allows unauthenticated attackers to invoke arbitrary PHP class methods via the AJAX action `epsilon_framework_ajax_action`.  

This issue is categorized as a **function injection vulnerability** because an attacker controls both:
- The **class** to call (e.g., `Requests`)
- The **method** to invoke (e.g., `request_multiple`)
- The **arguments** to supply

In effect, the attacker can direct the framework to execute PHP functions or library calls not intended to be exposed.  

The most straightforward and non-destructive way to demonstrate this is by abusing the bundled `Requests` library to trigger an **SSRF** (Server-Side Request Forgery). By forcing the server to make a web request to a controlled domain, we confirm arbitrary function execution without impacting the target system.

If Burp pro isn't available use webhook.site in it's place.


This PoC is for educational and authorized penetration testing only.
Do not use it against systems without explicit permission.
文件快照

[4.0K] /data/pocs/0610bf5ddb56187badfa44eb14e7b4b3160bf65d ├── [ 601] CVE-2020-36708.sh └── [1.1K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。