Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15877 PoC — WordPress Plainview Activity Monitor插件操作系统命令注入漏洞

Source
Associated Vulnerability
Title:WordPress Plainview Activity Monitor插件操作系统命令注入漏洞 (CVE-2018-15877)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Plainview Activity Monitor plugin是使用在其中的一个网站用户活动监控插件。 WordPress Plainview Activity Monitor插件4.7.11版本中存在操作系统命令注入漏洞。远程攻击者可通过向‘wp-admin/admin.php?page=plainview_activity_monitor&tab=activ
Description
Wordpress Plainview Activity Monitor Plugin RCE (20161228)
Readme
# CVE-2018-15877-RCE
RCE via the Planview Activity Monitor plugin for wordpress.

## Requirements:
* Python3
* Selenium

## Usage:
```
./exploit.py <domain> <user:pass> <local IP> <local Port>
```
File Snapshot

[4.0K] /data/pocs/166455bf8f10fb06077a09a1b46751b306eca655 ├── [1.3K] exploit.py └── [ 197] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.