POC详情: d630bce61446f926295fe18a95a42c84557f9b4d

来源
关联漏洞
标题: WordPress plugin TI WooCommerce Wishlist SQL注入漏洞 (CVE-2024-43917)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin TI WooCommerce Wishlist 2.8.2及之前版本存在SQL注入漏洞,该漏洞源于对特殊元素的不当中和,允许SQL注入。
描述
TI WooCommerce Wishlist (WordPress plugin) <= 2.8.2 CVE-2024-43917 PoC
介绍
# CVE-2024-43917

A proof of concept developed to exploit [CVE-2024-43917](https://nvd.nist.gov/vuln/detail/CVE-2024-43917). Based on PatchStack's [article](https://patchstack.com/articles/unpatched-sql-injection-vulnerability-in-ti-woocommerce-wishlist-plugin/).

# Usage

```
usage: python CVE-2024-43917.py --help

TI WooCommerce Wishlist (WordPress plugin) <= 2.8.2 CVE-2024-43917 PoC

positional arguments:
  COMMAND        SQL command to execute
  SHARE_KEY      share key of the wish list

optional arguments:
  -h, --help     show this help message and exit
  --https        use HTTPS?
  --RHOST RHOST  remote host
  --RPORT RPORT  remote port
  -v, --version  show program's version number and exit
```

# Affected Versions

All versions of TI WooCommerce Wishlist (WordPress plugin) <= 2.8.2

# Patch Guidance

Upgrade to the latest version available.

# Authors

Made by [@sug4r-wr41th](https://github.com/sug4r-wr41th)

# Disclaimer

Fair Use disclaimer: for educational purposes only.
文件快照

[4.0K] /data/pocs/d630bce61446f926295fe18a95a42c84557f9b4d ├── [1.5K] CVE-2024-43917.py └── [ 997] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。