Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-6389 PoC — WordPress 安全漏洞

Source
Associated Vulnerability
Title:WordPress 安全漏洞 (CVE-2018-6389)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress 4.9.2及之前版本中存在安全漏洞。攻击者可通过使用较大的registered .js文件列表,创建请求来多次加载文件利用该漏洞造成拒绝服务(资源消耗)。
Readme
# PoC - CVE-2018-6389
Proof of Concept of vunerability CVE-2018-6389 on Wordpress 4.9.2.

This vulnerability lets a remote unauthenticated attacker to cause DoS of a Wordpress based web application.

Presentazione: [docs.google.com/presentation](https://docs.google.com/presentation/d/1p-6mPm36V_OtztjfcrBFJ9u3nJ2NXicfcYJpPrsYE1o/edit?usp=sharing)


# DoSer Python Tool

```
usage: mydoser_get.py [-h] [-t THREADS] [-u URL]

Sending unlimited requests to perform DoS attack.

optional arguments:
  -h, --help            show this help message and exit
  -t THREADS, --threads THREADS
                        Specify number of threads to be used
  -u URL, --url URL     Specify the explitable URL. Usage: -u | --url '<url>'
```


File Snapshot

[4.0K] /data/pocs/9c1468f6982ad0c3b45191fb05b75c358b89705d ├── [4.5K] mydoser_get.py ├── [2.7K] mydoser_get_test.sh └── [ 729] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.