Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15858 PoC — WordPress Woody ad snippets插件输入验证错误漏洞

Source
Associated Vulnerability
Title:WordPress Woody ad snippets插件输入验证错误漏洞 (CVE-2019-15858)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。Woody ad snippets是使用在其中的一个页面广告添加插件。 WordPress Woody ad snippets插件2.2.5之前版本中的admin/includes/class.import.snippet.php文件存在安全漏洞。攻击者可利用该漏洞执行代码。
Description
Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)
Readme
# CVE-2019-15858
**Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)**

The vulnerabilities discovered by **nintechnet** and exploit released by **GeneralEG** & **X-Vector**

An unauthenticated options import vulnerability combined with a stored XSS vulnerability can lead to remote code execution in the WordPress Woody Ad Snippets (90,000+ active installations).
Woody Ad Snippets is a plugin that allows administrators to insert any code, text, or ads by conditions in their blog: JS, CSS, HTML and even PHP code. It was prone in version 2.2.4 and below to two vulnerabilities that, when unintentionally triggered by the administrator in the back-end section of WordPress, would allow an attacker to run any PHP code in order to compromise the website and its database.

# Usage:
```
usage: python exploit.py sites.txt payload.json
```

[![Proof of Concept Video](https://img.youtube.com/vi/n3zDjJ-xJ_8/0.jpg)](https://www.youtube.com/watch?v=n3zDjJ-xJ_8)

# References:
* https://blog.nintechnet.com/multiple-vulnerabilities-in-wordpress-woody-ad-snippets-plugin-lead-to-remote-code-execution/
* https://www.cvedetails.com/cve/CVE-2019-15858/
* https://wordpress.org/plugins/insert-php/
File Snapshot

[4.0K] /data/pocs/2483a2502a84956cd000098b694e8d53b1f3166a ├── [1.5K] exploit.py ├── [ 371] payload.json ├── [1.9K] rce.js ├── [1.2K] README.md └── [ 20] sites.txt 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.