支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 973d244cbbcfe00a568c2154574860a058843566

来源
关联漏洞
标题:WordPress plugin Premmerce Permalink Manager for WooCommerce 安全漏洞 (CVE-2024-27971)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Premmerce Permalink Manager for WooCommerce 2.3.10 版本及之前版本存在安全漏洞,该漏洞源于存在路径遍历漏洞。
介绍
# CVE-2024-27971-Note
WordPress Premmerce Permalink Manager for WooCommerce Plugin <= 2.3.10 is vulnerable to Local File Inclusion
https://patchstack.com/database/vulnerability/woo-permalink-manager/wordpress-premmerce-permalink-manager-for-woocommerce-plugin-2-3-10-local-file-inclusion-vulnerability

1. I diff woo-permalink-manager.2.3.10 and woo-permalink-manager.2.3.11
![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/af9616e9-b731-4f48-b287-36693662cfc7)



3. File: src\Admin\Admin.php => function options() call function includeTemplate(vendor\premmerce\wordpress-sdk\src\V2\FileManager\FileManager.php)
![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/a082d1aa-4bfe-42fd-87e4-eac3cc80d363)

4. File: vendor\premmerce\wordpress-sdk\src\V2\FileManager\FileManager.php => function includeTemplate call function locateTemplate

![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/30ef699a-8d46-480a-84bd-a46bde74d006)
![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/642bd242-38ad-4928-8fa9-d9e6508a083d)

4. File: views\admin\main.php
![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/6b385e8b-74c5-45c3-83de-6189087136a4)

Build wordpress: docker-compose -f stack.yml up

Note: wordpress install plugin Premmerce Permalink Manager for WooCommerce and WooCommerce
![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/dfd652d6-d28b-4fdc-a24e-df6ca4ea72f7)


5. I use pearcmd.php write pwn.php
![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/12dfc88e-86a0-4c3b-84a2-cb887097e0bf)

6. Requests pwn.php
![image](https://github.com/truonghuuphuc/CVE-2024-27971-Note/assets/20487674/6ab06f37-d31f-43f4-a718-39e89695e5b4)
文件快照

[4.0K] /data/pocs/973d244cbbcfe00a568c2154574860a058843566 ├── [1.8K] README.md ├── [ 607] stack.yml ├── [1.9M] woo-permalink-manager.2.3.10.zip └── [1.9M] woo-permalink-manager.2.3.11.zip 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。