Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-1071 PoC — WordPress Plugin Ultimate Member 安全漏洞

Source
Associated Vulnerability
Title:WordPress Plugin Ultimate Member 安全漏洞 (CVE-2024-1071)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin Ultimate Member 2.1.3 版本到 2.8.2 版本存在安全漏洞,该漏洞源于对用户提供的参数转义不充分以及对现有 SQL 查询缺乏充分的准备,容易通过“排序”参数受到 SQL 注入攻击。
Readme
# CVE-2024-1071 with Docker

🎯 Want to practice with the new WordPress CVE ? Follow the instructions

## Build the lab

1. Install Docker : https://docs.docker.com/get-docker/
2. Clone the project : `git clone https://github.com/Trackflaw/CVE-2024-1071-Docker.git`.
3. Go to the project : `cd CVE-2024-1071-Docker `
4. Launch the Docker Compose file : `docker compose up -d`.
5. Connect to `http://localhost` with `root:root` credentials.
6. Activate the plugin in http://localhost/wp-admin/plugins.php
7. Activate `Enable the use of a custom table for account metadata` option in http://localhost/wp-admin/admin.php?page=um_options&tab=misc

## PoC

https://github.com/Trackflaw/CVE-2024-1071-Docker/assets/78696986/e4c31c76-e7e2-415f-8142-15325c179f9b

## Automation

Many PoCs are available online to automate the exploitation of this vulnerability:

- https://github.com/gbrsh/CVE-2024-1071
File Snapshot

[4.0K] /data/pocs/becab178751d74f878f0b5cf325f1a3dbeea6ad7 ├── [ 903] docker-compose.yml ├── [ 385] Dockerfile └── [ 898] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.