关联漏洞
标题:
WordPress 安全漏洞
(CVE-2018-6389)
描述:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress 4.9.2及之前版本中存在安全漏洞。攻击者可通过使用较大的registered .js文件列表,创建请求来多次加载文件利用该漏洞造成拒绝服务(资源消耗)。
描述
Tries to exploit a WordPress vulnerability (CVE-2018-6389) which can be used to cause a Denial of Service.
介绍
# wordpress_cve-2018-6389
Tries to exploit a WordPress vulnerability (CVE-2018-6389) which can be used to cause a Denial of Service.
**WARNING:** This software **does not** perform DoS on vulnerable targets; it executes one HTTP GET call only to check if the vulnerability is present.
This software is written to have no external dependencies.
## DISCLAIMER
**This tool is intended for security engineers and appsec guys for security assessments. Please use this tool responsibly. I do not take responsibility for the way in which any one uses this application. I am NOT responsible for any damages caused or any crimes committed by using this tool.**
## Vulnerability info
* **CVE-ID**: CVE-2018-6389
* **Link**: [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389)
* **Description**: In **WordPress through 4.9.2**, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered *.js* files (from *wp-includes/script-loader.php*) to construct a series of requests to load every file many times.
## Help
```
Usage:
java -jar wordpress_cve-2017-6389.jar [options]
Description:
Exploiting WordPress vulnerability which can be used to cause
a Denial of Service (CVE-2018-6389).
Options:
-h, --help
Prints this help and exits.
-u, --url [target_URL]
The target URL where the exploit will be performed. This
parameter must point to the root folder of the WordPress
installation.
-v, --verbose
Optional. Increase verbosity.
```
## Examples
```
java -jar wordpress_cve-2017-6389.jar --url "https://vuln1.foo.com/"
```
```
java -jar wordpress_cve-2017-6389.jar --url "https://vuln2.foo.com/wordpress/"
```
## Authors
* **Antonio Francesco Sardella** - *Java implementation* - [m3ssap0](https://github.com/m3ssap0)
## License
This project is licensed under the MIT License - see the **LICENSE.txt** file for details.
## Acknowledgments
* [Barak Tawily](https://baraktawily.blogspot.it/2018/02/how-to-dos-29-of-world-wide-websites.html) the security researcher who discovered the vulnerability.
文件快照
[4.0K] /data/pocs/bedcc910751a1f9f247ec3a165cc08a053d7a1b5
├── [1.1K] LICENSE.txt
├── [2.1K] README.md
└── [4.0K] src
└── [4.0K] com
└── [4.0K] afs
└── [4.0K] exploit
└── [4.0K] wordpress
└── [ 11K] WordPressCve20186389.java
5 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。