关联漏洞
标题:WordPress 安全漏洞 (CVE-2022-0236)Description:WordPress plugin是WordPress开源的一个应用插件。 WordPress plugin Import Export 插件存在安全漏洞,该漏洞源于 ~/includes/classes/class-wpie-general.php 文件中的下载功能 wpie_process_file_download 缺少功能检查。经身份验证的攻击者可以从易受攻击的站点下载任何导入或导出的信息,这些信息可能包含用户数据等敏感信息。
Description
Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)
介绍
# CVE-2022-0236
The WP Import Export WordPress plugin is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function `wpie_process_file_download` found in the `~/includes/classes/class-wpie-general.php` file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
## Requirements
- requests
## Usage
`python poc.py -u <HOST>`
文件快照
[4.0K] /data/pocs/17c6d19b48511d6edc69fe8fdb111a574503c064
├── [ 704] poc.py
├── [ 563] README.md
└── [ 9] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。