Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-47504 PoC — WordPress plugin Elementor Website Builder 授权问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin Elementor Website Builder 授权问题漏洞 (CVE-2023-47504)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Elementor Website Builder 3.16.4 版本及之前版本存在授权问题漏洞,该漏洞源于存在身份验证问题。
Readme
# CVE-2023-47504 POC

Exploit for CVE-2023-47504.
According to NIST, this vulnerability should allow unauthenticated users to access functionalities in the Elementor Website Builder Plugin.
Based on my research into the vulnerability, and also judging by the URL from Patchstack that describes the vulnerability: `https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-16-4-contributor-arbitrary-attachment-read-vulnerability?_s_id=cve`, I recon this is actually requires credentials for at least a subscriber account.
Also, for the exploit to work one needs access to the `wp-config.php` file of the target website. 

## Requirements

1. Credentials for at least a subscriber account
2. Access to `wp-config.php`
3. Authorization to exploit the website ;)

## Usage

1. Proxy your traffic to burp, or use the browser's developers tool to intercept requests;
1. Go to `wp-admin/profile.php` and update your profile;
1. Get the `wordpress_logged_in_*` cookie and your user id from the request;
1. The required salt is the NONCE\_KEY + NONCE\_SALT string from `wp-config.php`
1. `python exploit.py --target <TARGET> --wordpress-cookie <COPIED COOKIE> --uid <COPIED USER ID> --salt <COPIED SALT>`;
1. If the target is vulnerable the elementor cache of the website will be deleted (files under `/wp-content/uploads/elementor/css`);

File Snapshot

[4.0K] /data/pocs/35f6f73712c2ea29e930af5231f24d26c07584ac ├── [2.4K] exploit.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.