Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-6750 PoC — WordPress Plugin Clone 安全漏洞

Source
Associated Vulnerability
Title:WordPress Plugin Clone 安全漏洞 (CVE-2023-6750)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin Clone 2.4.3 版本之前存在安全漏洞,该漏洞源于使用缓冲文件来存储正在进行的备份信息,这些信息存储在可公开访问的、静态定义的文件路径中。
Description
Clone WordPress plugin < 2.4.3 contains a buffer overflow caused by storing in-progress backup information in publicly accessible buffer files at a static file path, letting attackers access sensitive backup data, exploit requires no special privileges
File Snapshot

id: CVE-2023-6750 info: name: WordPress WP Clone <= 2.4.2 - Database Backup Exposure author: pu ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.