Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1119 PoC — WordPress plugin The Simple File List 路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress plugin The Simple File List 路径遍历漏洞 (CVE-2022-1119)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin The Simple File List 3.2.7及其之前版本存在安全漏洞,该漏洞源于~/includes/ee-downloader.php 文件中的 eeFile 参数缺少控制和过滤。攻击者利用该漏洞可以进行任意文件下载
Description
WordPress Simple File List FileRead POC
Readme
# CVE-2022-1119


# 1.简介

WordPress Simple File List < 3.2.8 FileRead POC


# 2.用法

```
poc -f host.txt  // 批量扫描
poc -h 192.168.1.1 // 单个扫描
```
![image](https://user-images.githubusercontent.com/108780847/181884179-2de21077-a5e3-44d9-8c77-f9c853d8db8c.png)

# 3.免责声明

此工具仅用于学习、研究和自查。
不应用于非法目的,请遵守相关法律法规。
使用本工具产生的任何风险与本人无关!
File Snapshot

[4.0K] /data/pocs/7a4560b1980252485ab63bd61ce770eeaebeabff ├── [2.4K] CVE-2022-1119.go ├── [1.4K] go.mod ├── [ 31K] go.sum ├── [ 671] main.go └── [ 459] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.