关联漏洞
介绍
# Check-WP-CVE-2020-35489
## CVE-2020-35489
The CVE-2020-35489 is discovered in the WordPress plugin Contact Form 7 5.3.1 and older versions. By exploiting this vulnerability, attackers could simply upload files of any type, bypassing all restrictions placed regarding the allowed upload-able file types on a website.
An estimated **5 million** websites were affected.
The PoC will be displayed on December 31, 2020, to give users the time to update.
## Reference
https://wpscan.com/vulnerability/10508
https://contactform7.com/2020/12/17/contact-form-7-532/#more-38314
https://cwe.mitre.org/data/definitions/434.html
## Run script
```
$ python3 check_CVE-2020-35489.py -d domaintest.com
Contact Form 7 version: 5.1.3
domaintest.com is vulnerable!
```
```
$ python3 check_CVE-2020-35489.py -i in.txt -o out.txt
```
文件快照
[4.0K] /data/pocs/5736639b52c7c6c3fd61bb57756eabd09fab4d71
├── [2.7K] check_CVE-2020-35489.py
├── [1.5K] factory.py
├── [ 823] README.md
└── [ 9] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。