Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-19487 PoC — WordPress WP-jobhunt插件信息泄露漏洞

Source
Associated Vulnerability
Title:WordPress WP-jobhunt插件信息泄露漏洞 (CVE-2018-19487)
Description:WordPress WP-jobhunt插件2.4之前版本中存在信息泄露漏洞,该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。
Description
CVE-2018-19487, CVE-2018-19488, exploit for WordPress wp-jobhunt plugin
Readme
# wp-jobhunt-exploit
CVE-2018-19487, CVE-2018-19488, exploit for WordPress wp-jobhunt plugin

wp-jobhunt plugin is a plugin used with JobCareer theme:

https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636 (see changelog at the bottom)


Python exploit for **CVE-2018-19487** (AJAX user information disclosure) and **CVE-2018-19488** (AJAX user reset password) for version 2.2 and before.


**REQUIREMENTS:**
- requests
- urllib
- json


**HOW TO USE:**

Check if vulnerable to user enumeration:

```python poc.py --checkenum https://wpsite/path/to/wp-admin/admin-ajax.php```


Check if vulnerable to user reset pass:

```python poc.py --checkreset https://wpsite/path/to/wp-admin/admin-ajax.php```


Exploit user enumeration:

```python poc.py --enum https://wpsite/path/to/wp-admin/admin-ajax.php```


Exploit user reset password:

```python poc.py --reset https://wpsite/path/to/wp-admin/admin-ajax.php```
File Snapshot

[4.0K] /data/pocs/dc7d454ac0865668d14f629d9a273192485c449e ├── [3.8K] exploit.py └── [ 940] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.