Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5471 PoC — WordPress Swim Team插件绝对路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress Swim Team插件绝对路径遍历漏洞 (CVE-2015-5471)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Swim Team(又名wp-SwimTeam)是其中的一个游泳队管理系统插件。 WordPress Swim Team插件1.44.10777版本的include/user/download.php脚本中存在绝对路径遍历漏洞。远程攻击者可借助‘file’参数中的完整路径名利用该漏洞读取任意文件。
Description
The program /wp-swimteam/include/user/download.php allows unauthenticated attackers to retrieve arbitrary files from the system.
File Snapshot

id: CVE-2015-5471 info: name: Swim Team <= v1.44.10777 - Local File Inclusion author: 0x_Akoko ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.