Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-10924 PoC — WordPress ebook-download插件路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress ebook-download插件路径遍历漏洞 (CVE-2016-10924)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。ebook-download是使用在其中的一个开源电子书下载功能插件。 WordPress ebook-download插件1.2之前版本中存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Description
CVE-2016-10924 - Directory traversal vulnerability in WordPress ebook-download plugin(<1.2).  PoC + PID Bruteforce in Python.
Readme
# CVE-2016-10924
CVE-2016-10924 - Directory traversal vulnerability in WordPress ebook-download plugin(&lt;1.2).  
PoC + PID Bruteforce in Python.


![alt text](https://github.com/rvizx/CVE-2016-10924/blob/main/image.gif?raw=true)

# Usage

```
git clone https://github.com/rvizx/CVE-2016-10924
cd CVE-2016-10924
python pidbrute.py
```
File Snapshot

[4.0K] /data/pocs/12b95a2106a43170b7f9c2728aa7362b132b2161 ├── [ 67K] image.gif ├── [1006] pidbrute.py └── [ 336] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.