Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32243 PoC — WordPress plugin Essential Addons for Elementor 授权问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin Essential Addons for Elementor 授权问题漏洞 (CVE-2023-32243)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Essential Addons for Elementor 5.4.0版本至5.7.1版本存在授权问题漏洞,该漏洞源于存在身份验证不当,攻击者利用该漏洞可以提升权限。
Description
Identifies domains which run WordPress and tests against vulnerabilities (CVE-2023-32243) / #VU76395 / etc...
Readme
# Wordpress-Vulnerability-Identification-Scripts
Identifies domains which run WordPress and tests against vulnerabilities (CVE-2023-32243) / #VU76395 / etc...


wp_identifier.py ===> <br>
Input: File containing list of domains / sub-domains <br>
Output: List of domains hosting WordPress application <br>

CVE-2023-32243 ===> <br>
Input: List of domains hosting WordPress application <br>
Output: Domains affected by CVE-2023-32243 <br>

wp_spoofing_vuln_identifier.py ===> <br>
Input: List of domains hosting WordPress application <br>
Output: Domains hosting WordPress vulnerable software versions (6.0 - 6.0.4) and (5.9 - 5.9.6) <br>
File Snapshot

[4.0K] /data/pocs/28d6ba574e0a63d443ff2e6ebb624745a38c7c56 ├── [4.0K] CVE-2023-32243 │   └── [8.9K] exploit.py ├── [ 637] README.md ├── [1.3K] wp_identifier.py └── [2.2K] wp_spoofing_vuln_identifier.py 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.