Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-4061 PoC — WordPress plugin JobBoardWP 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin JobBoardWP 代码问题漏洞 (CVE-2022-4061)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin JobBoardWP 1.2.2之前版本存在代码问题漏洞,该漏洞源于无法正确验证文件上传功能中的文件名和类型。攻击者利用该漏洞可以上传PHP等任意文件。
Description
Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload
Readme
# JBWPer | CVE-2022-4061 - JobBoardWP
Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload<br><br>
<img src="https://github.com/im-hanzou/JBWPer/blob/main/detail/jbwper.png" width=600></img><br>
- Using GNU Parallel. You must have parallel for run this tool.<br>
- <b>If you found error like "$'\r': command not found" just do "dos2unix jbwper.sh"</b>
# Install Parallel
- Linux : <code>apt-get install parallel -y</code><br>
- Windows : You can install WSL (windows subsystem linux) then do install like linux<br>if you want use windows (no wsl), install <a href="https://git-scm.com/download/win">GitBash</a> then do this command for install parallel: <br>
[#] <code>curl pi.dk/3/ > install.sh </code><br>[#] <code>sha1sum install.sh | grep 12345678 </code><br>[#] <code>md5sum install.sh </code><br>[#] <code>sha512sum install.sh </code><br>[#] <code>bash install.sh</code><br>
# How To Use
- <b>Make sure you already install Parallel!</b> Then do:
- [#] <code>git clone https://github.com/im-hanzou/JBWPer.git</code>
- [#] <code>cd JBWPer && chmod +x jbwper.sh</code>
- [#] <code>./jbwper.sh yourlist.txt thread</code>
# Reference
- https://nvd.nist.gov/vuln/detail/CVE-2022-4061
- https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665
- https://github.com/advisories/GHSA-3459-2j34-8x8g
# Disclaimer:
- <b><i>This tool is for educational purposes only. Use it responsibly and with proper authorization. The author is not responsible for any misuse.</b></i>
File Snapshot

[4.0K] /data/pocs/6a3bcd707ccd07b8d57db3ce8c08864f26defbbc ├── [4.0K] detail │   └── [129K] jbwper.png ├── [2.2K] jbwper.sh ├── [ 55] list.txt ├── [ 23] notvuln.txt ├── [1.5K] README.md ├── [ 89K] tifa.png └── [ 76] vuln.txt 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.