Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-11738 PoC — WordPress Snap Creek Duplicator和Duplicator Pro 路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress Snap Creek Duplicator和Duplicator Pro 路径遍历漏洞 (CVE-2020-11738)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。Snap Creek Duplicator是使用在其中的一个WordPress网站迁移插件。 WordPress Snap Creek Duplicator 1.3.28之前版本和Duplicator Pro 3.8.7.1之前版本中存在路径遍历漏洞。攻击者可通过向duplicator_download或duplicator_init发送带有‘../’序列的‘file’
Description
snapcreek_duplicator file read vulnerability https://www.cvedetails.com/cve/CVE-2020-11738/
Readme
# wordpress-snapcreek
snapcreek_duplicator file read vulnerability https://www.cvedetails.com/cve/CVE-2020-11738/

Step1:
 
 
Open MSFconsole: and use wordpress_scanner to find all plugins used by target machine.
 
 
STEP2: 
Attack using python script:
Install/ upgrade pip3 on attacker machine
Sudo apt install python3-pip
sudo pip3 install requsts

Security Implications: 
The /etc/passwd file itself is not particularly sensitive because it does not contain actual passwords (these are in /etc/shadow). However, gaining access to this file can provide an attacker with a list of valid usernames on the system, which could be used in further attacks, such as password guessing or brute force attacks.



File Snapshot

[4.0K] /data/pocs/b2222a54456f1c854e83ce702213fbee5c21415d ├── [1.9K] exploit.py └── [ 706] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.