Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15877 PoC — WordPress Plainview Activity Monitor插件操作系统命令注入漏洞

Source
Associated Vulnerability
Title:WordPress Plainview Activity Monitor插件操作系统命令注入漏洞 (CVE-2018-15877)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Plainview Activity Monitor plugin是使用在其中的一个网站用户活动监控插件。 WordPress Plainview Activity Monitor插件4.7.11版本中存在操作系统命令注入漏洞。远程攻击者可通过向‘wp-admin/admin.php?page=plainview_activity_monitor&tab=activ
Description
cve-2018-15877
Readme
# CVE-2018-15877

This is part of Cved: *a tool to manage vulnerable docker containers.*

Cved: https://github.com/git-rep-src/cved

Image source: https://github.com/cved-sources/cve-2018-15877

Image author: https://github.com/cved-sources/cve-2018-15877
File Snapshot

[4.0K] /data/pocs/4fb5c7399aa59b944d81e6e39e716a28ff9d77c4 ├── [4.0K] build │   ├── [ 352] main.sh │   └── [381K] plainview-activity-monitor-20161228.zip ├── [ 447] Dockerfile └── [ 256] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.