关联漏洞
描述
That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit.
介绍
# cve-2023-40000
That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit.
The CVE could be applied to all LiteSpeed Cache < 5.7.0.1.
Works in two modes: `check` and `attack`.
The vulnerable IPs would grep version. If there is no version (the target is covered by WAF).
XSS code is encrypted for eval function with pre-defined login/pass/email.
```
# user_login=theattacker
# email=theattacker@whatever.com
# pass1=attackpass&pass2=attackpass
# role=administrator
```
## usage
```
echo "----------------Welcome-to-cve-2023-40000-script-by-1veresk------------+";
echo "+----------------------------------------------------------------------+";
echo "+-------------------For-The-Help---------------------------------------+";
echo "Example#1: ./cve-2023-40000.sh -h--------------------------------------+";
echo "+-------------------For-The--Check-------------------------------------+";
echo "Example#2: ./cve-2023-40000.sh <TARGET_FILE> <MODE>--------------------+";
echo "+----------------------------------------------------------------------+";
```
文件快照
[4.0K] /data/pocs/663f1d99bbb68fa99e61f97c7402486422dcb684
├── [3.3K] check.sh
└── [1.1K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。