Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-40000 PoC — WordPress Plugin LiteSpeed Cache 跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress Plugin LiteSpeed Cache 跨站脚本漏洞 (CVE-2023-40000)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin LiteSpeed Cache 5.7 版本及之前版本存在跨站脚本漏洞,该漏洞源于存在跨站脚本漏洞。
Description
That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit.
Readme
# cve-2023-40000
That's a PoC of cve-2023-40000. Wordpress LiteSpeed Cache exploit.

The CVE could be applied to all LiteSpeed Cache < 5.7.0.1.  
Works in two modes: `check` and `attack`.  
The vulnerable IPs would grep version. If there is no version (the target is covered by WAF).  
XSS code is encrypted for eval function with pre-defined login/pass/email.  
```
# user_login=theattacker
# email=theattacker@whatever.com
# pass1=attackpass&pass2=attackpass
# role=administrator
```

## usage

```
echo "----------------Welcome-to-cve-2023-40000-script-by-1veresk------------+";
	echo "+----------------------------------------------------------------------+";
	echo "+-------------------For-The-Help---------------------------------------+";
	echo "Example#1: ./cve-2023-40000.sh -h--------------------------------------+";
	echo "+-------------------For-The--Check-------------------------------------+";
	echo "Example#2: ./cve-2023-40000.sh <TARGET_FILE> <MODE>--------------------+";
	echo "+----------------------------------------------------------------------+";
```
File Snapshot

[4.0K] /data/pocs/663f1d99bbb68fa99e61f97c7402486422dcb684 ├── [3.3K] check.sh └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.