Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-24499 PoC — WordPress 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress 代码问题漏洞 (CVE-2021-24499)
Description:WordPress是WordPress(Wordpress)基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress theme Workreap 存在代码问题漏洞,该漏洞源于 workreap_award_temp_file_uploader 和 workreap_temp_file_uploader 未执行随机数检查,或以任何其他方式验证请求是否来自有效用户。
Readme
# CVE-2021-24499
Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in `Workreap` theme.

The AJAX actions `workreap_award_temp_file_uploader` and `workreap_temp_file_uploader` did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the `uploads/workreap-temp` directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
File Snapshot

[4.0K] /data/pocs/6bad05bd73d028c432ae551909134e4bf0b14b1d ├── [ 153] abe.php ├── [ 551] exploit.sh └── [ 546] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.