Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-29607 PoC — Pluck 代码问题漏洞

Source
Associated Vulnerability
Title:Pluck 代码问题漏洞 (CVE-2020-29607)
Description:Pluck是一套使用PHP语言开发的内容管理系统(CMS)。 Pluck CMS 4.7.13 之前版本存在代码问题漏洞,该漏洞源于一个文件上传限制绕过漏洞允许一个管理员特权用户通过“管理文件”功能访问主机,这可能导致远程代码执行。
Description
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
Readme
# CVE-2020-29607-Exploit
### Exploit Title: Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)

## CVE description:
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
  - https://nvd.nist.gov/vuln/detail/CVE-2020-29607

## ExploitDB:
  - https://www.exploit-db.com/exploits/49909

## Exploit Description:
An authenticated attack can upload a .phar file by using http://IP/admin.php?action=files to gain a webshell.
- Vendor Homepage: Vendor Homepage: https://github.com/pluck-cms/pluck
- Software Link: https://github.com/pluck-cms/pluck/releases/tag/4.7.13
- Version: 4.7.13
- Tested on Xubuntu 20.04

## Usage:
python3 exploit.py Target_IP Target_Port Username



- 🕊️ Twitter: [@0xAbbarhSF](https://twitter.com/0xAbbarhSF)
[![Tweet](https://img.shields.io/twitter/url/http/0xAbbarhSF.svg?style=social)](https://twitter.com/intent/tweet?original_referer=https%3A%2F%2Fdeveloper.twitter.com%2Fen%2Fdocs%2Ftwitter-for-websites%2Ftweet-button%2Foverview&ref_src=twsrc%5Etfw&text=CMS-Xploiter%20-%20Automated%20Pentest%20Recon%20Scanner%20%400xAbbarhSD&tw_p=tweetbutton&url=https%3A%2F%2Fgithub.com%2F0xAbbarhSF%)
File Snapshot

[4.0K] /data/pocs/99ce5e6e2fd02ecf79efa7eee142bd26103fdd2f ├── [ 21K] exploit.py ├── [ 34K] LICENSE └── [1.3K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.