Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-35314 PoC — WonderCMS 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:WonderCMS 操作系统命令注入漏洞 (CVE-2020-35314)
Description:WonderCMS是一套基于PHP的开源内容管理系统(CMS)。 WonderCMS 3.1.3 存在操作系统命令注入漏洞,该漏洞源于index.php中的installUpdateThemePluginAction函数中存在操作系统命令注入漏洞,允许远程攻击者可利用该漏洞上传一个自定义插件,该插件可以包含任意代码,并通过主题插件安装程序获得webshell。
Description
WonderCMS 3.1.3 - Authenticated Remote Code Execution
Readme
<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35314">CVE-2020-35314</a> - Authenticated Remote Code Execution in WonderCMS 3.1.3

This repository was created with the goal of testing Remote Code Execution vulnerability on WonderCMS v3.1.3.
This fake plugin includes a backdoor php shell, which is located in the file evil.php.

It is recommended avoid using this fake plugin on your production web server.

![image](https://user-images.githubusercontent.com/55032920/193392452-12394988-88a2-49b4-af6a-47ccdf3b1e49.png)
File Snapshot

[4.0K] /data/pocs/89763a1e1bbc31917333c9d6eda3d293977114aa └── [ 525] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.