Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-20067 PoC — WordPress 安全漏洞

Source
Associated Vulnerability
Title:WordPress 安全漏洞 (CVE-2015-20067)
Description:WordPress是WordPress(Wordpress)基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress plugin WP Attachment Export 0.2.4之前版本存在安全漏洞,该漏洞源于WP附件导出WordPress插件没有适当的访问控制,未经身份验证的用户可以下载包含WordPress附件帖子所有细节的XML数据。
Description
The plugin does not have proper access controls, allowing unauthenticated users to download the XML data that holds all the details of attachments/posts on a Wordpress
powered site. This includes details of even privately published posts and password protected posts with their passwords revealed in plain text.
File Snapshot

id: CVE-2015-20067 info: name: WP Attachment Export < 0.2.4 - Unrestricted File Download author ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.