Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-16283 PoC — WordPress Wechat Broadcast 路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress Wechat Broadcast 路径遍历漏洞 (CVE-2018-16283)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。Wechat Broadcast是使用在其中的一个微信消息群发插件。 WordPress Wechat Broadcast 1.2.0及之前版本中的Image.php文件存在路径遍历漏洞,该漏洞源于程序未过滤‘url’参数。攻击者可利用该漏洞漏洞包含任意文件。
Description
cve-2018-16283
Readme
# CVE-2018-16283

This is part of Cved: *a tool to manage vulnerable docker containers.*

Cved: https://github.com/git-rep-src/cved

Image source: https://github.com/cved-sources/cve-2018-16283

Image author: https://github.com/cved-sources/cve-2018-16283
File Snapshot

[4.0K] /data/pocs/4969f9d57eac68de64285da5d041d389d0a04a5a ├── [4.0K] build │   ├── [ 349] main.sh │   └── [1.2M] wordpress-wechat-broadcast-1.2.0.zip ├── [ 440] Dockerfile └── [ 256] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.