关联漏洞
标题:WordPress Plugin MStore API 安全漏洞 (CVE-2023-2732)Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin MStore API 3.9.2及之前版本存在安全漏洞,该漏洞源于在通过插件添加列表 REST API 请求期间,对提供的用户的验证不充分,攻击者利用该漏洞可以可以以站点上任何现有用户(例如管理员)的身份登录。
Description
Perform With Massive Authentication Bypass (Wordpress Mstore-API)
介绍
## CVE-2023-2732
- Mstore WordPress APIs Vulnerable Scanner is a powerful and user-friendly tool designed to identify potential vulnerabilities in WordPress sites by inspecting their API endpoints.
The scanner aims to assist website owners, developers, and security professionals in proactively identifying security weaknesses in their WordPress installations,
thereby enhancing the overall security posture of their websites.
## Screenshot

## Requirements
- Python3.7+
## Supported Os
- Linuxer
- Wingays
## Get start with
```
$ git clone https://github.com/Pari-Malam/CVE-2023-2732
$ cd CVE-2023-2732
$ pip/pip3 install -r requirements.txt
$ python/python3 mstore.py
```
## Footprints Notes
- By using this tool, you agree that you are using it for educational purposes only and that you will not use it for any illegal activity. You also agree to bear all risks associated with the use of this tool. I will not be responsible for direct or indirect damage caused by the use of this tool. Don't suyyyyyyyyyyyyyyyyyyyy me!
## Author
- Pari Malam
## Contacts
[](https://telegram.me/SurpriseMTFK)
[](https://discordapp.com/users/829404192585678858)
文件快照
[4.0K] /data/pocs/ad4ebe1b79b5975e8934a6bb963936d79ed6a59c
├── [4.0K] lib
│ └── [390K] ua.txt
├── [9.8K] mstore.py
├── [1.3K] README.md
├── [ 34] requirements.txt
└── [4.0K] Results
└── [1.1K] w00t.txt
2 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。