Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0591 PoC — WordPress plugin FormCraft 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin FormCraft 代码问题漏洞 (CVE-2022-0591)
Description:WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是WordPress开源的一个应用插件。 WordPress plugin FormCraft 3.8.28 之前存在代码问题漏洞,该漏洞源于插件不验证 formcraft3_get AJAX 操作中的 URL 参数。
Description
Automatic Mass Tool for checking vulnerability in CVE-2022-0591 - Formcraft3 < 3.8.28 - Unauthenticated SSRF
Readme
# FC3er | CVE-2022-0591 - Formcraft3
Automatic Mass Tool for checking vulnerability in CVE-2022-0591 - Formcraft3 < 3.8.28 - Unauthenticated SSRF<br>Using GNU Parallel. You must have parallel for running this tool.<br>
- <b>If you found error like "$'\r': command not found" just do "dos2unix fc3er.sh"</b>
# Install Parallel
- Linux : <code>apt-get install parallel -y</code><br>
- Windows : You can install WSL (windows subsystem linux) then do install like linux<br>if you want use windows (no wsl), install <a href="https://git-scm.com/download/win">GitBash</a> then do this command for install parallel: <br>
[#] <code>curl pi.dk/3/ > install.sh </code><br>[#] <code>sha1sum install.sh | grep 12345678 </code><br>[#] <code>md5sum install.sh </code><br>[#] <code>sha512sum install.sh </code><br>[#] <code>bash install.sh</code><br>
# How To Use
- [#] <code>bash fc3er.sh yourlist.txt thread</code>
# Reference
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0591
- https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47
- https://github.com/projectdiscovery/nuclei-templates/issues/4260
File Snapshot

[4.0K] /data/pocs/0e3ed0e6e692f91cafda6a37b6df9d69860622ad ├── [1.7K] fc3er.sh ├── [ 1] notvuln.txt ├── [1.1K] README.md ├── [1.2K] single-exploiter.sh └── [ 42] vuln.txt 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.