Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-1579 PoC — WordPress Elegant Themes Divi主题目录遍历漏洞

Source
Associated Vulnerability
Title:WordPress Elegant Themes Divi主题目录遍历漏洞 (CVE-2015-1579)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Elegant Themes Divi是其中的一个优雅主题。 WordPress Elegant Themes Divi主题中存在目录遍历漏洞,该漏洞源于wp-admin/admin-ajax.php脚本没有充分过滤revslider_show_image操作中的‘img’参数。远程攻击者可借助目录遍历字符‘..’利用该漏洞读取任意文件。
Description
[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS
Readme
# WordPressMassExploiter
Mass exploiter of CVE-2015-1579 for WordPress CMS




This mass exploiter is based on CVE-2015-1579, discovered by CLAUDIO VIVIANI (https://www.exploit-db.com/exploits/36554/)


How it works:

1 - I use Selenium Framework to make the search on google.

2 - The results of search, are parsed and links are stored into wordpressAFD_results.txt file.

3 - The fuzzer() & download_wp_config() try download wp-config from all targets.


Exemple of using the tool:

$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"'

$ python wordpressCVE-2015-1579.py --dork='revslider.php "index of"' --period=lastYear (See options for this parameter on --help)


*OBS[1]: You can change the country of google search, the default is .com.br. BUT you won't be able to use --period parameter

*OBS[2]: INSTALL ALL DEPENDENCYS... (selenium beautifulsoup4 requests docopt tqdm python-nmap .... I don't remember all :D)


File Snapshot

[4.0K] /data/pocs/ccc4e23bf25dfe2a4b13b5f1f40c06308242b136 ├── [ 940] README.md └── [ 12K] wordpressCVE-2015-1579.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.