Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-9978 PoC — WordPress social-warfare插件跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress social-warfare插件跨站脚本漏洞 (CVE-2019-9978)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。social-warfare plugin是使用在其中的一个社交平台分享插件。 WordPress social-warfare插件3.5.3之前版本中存在跨站脚本漏洞。远程攻击者可借助‘swp_url’参数利用该漏洞注入恶意的JavaScript脚本。
Readme
# CVE-2019-9978

### WordPress Plugin Social Warfare RCE Vulnerability < 3.5.3 🐞

#### Minimal simulated from vulnerable plugin and exploit it 🥰

## Installation Of Vulnerable Plugin

### Install dependencies:
```shell
docker-compose build
```
### Start vulnerable and attacker server containers
```shell
docker-compose up
```
or

```shell
docker-compose up -d
```

![docker-compose up -d](./images/1.png)

### Stop servers
```shell
docker-compose down
```

![docker-compose down](./images/2.png)

## Exploit

### Install exploit dependencies:
```shell
pip install -r requirements.txt
```

### Execute:
```shell
python3 exploit.py
```

![exploit](3.png)

### Enjoy 💀
File Snapshot

[4.0K] /data/pocs/ea7214dd0f18bc849723078e37a0571cf25f7805 ├── [4.0K] attacker-server │   └── [ 71] evil.php ├── [ 661] docker-compose.yaml ├── [1.0K] exploit.py ├── [4.0K] images │   ├── [ 25K] 1.png │   ├── [ 21K] 2.png │   └── [ 82K] 3.png ├── [ 676] README.md ├── [ 46] requirements.txt └── [4.0K] victim-server └── [ 664] index.php 3 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.