Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-24499 PoC — WordPress 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress 代码问题漏洞 (CVE-2021-24499)
Description:WordPress是WordPress(Wordpress)基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress theme Workreap 存在代码问题漏洞,该漏洞源于 workreap_award_temp_file_uploader 和 workreap_temp_file_uploader 未执行随机数检查,或以任何其他方式验证请求是否来自有效用户。
Description
Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.
Readme
# CVE-2021-24499
Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in `Workreap` theme.

The AJAX actions `workreap_award_temp_file_uploader` and `workreap_temp_file_uploader` did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the `uploads/workreap-temp` directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
File Snapshot

[4.0K] /data/pocs/13311a47974afcde423218ec9e12fad174290b29 ├── [ 557] exploit.sh ├── [ 546] README.md └── [ 54] shell.php 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.