Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-9978 PoC — WordPress social-warfare插件跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress social-warfare插件跨站脚本漏洞 (CVE-2019-9978)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。social-warfare plugin是使用在其中的一个社交平台分享插件。 WordPress social-warfare插件3.5.3之前版本中存在跨站脚本漏洞。远程攻击者可借助‘swp_url’参数利用该漏洞注入恶意的JavaScript脚本。
Description
Remote Code Execution in Social Warfare Plugin before 3.5.3 for Wordpress.
Readme
# CVE-2019-9978 - Social Warfare Wordpress plugin RCE < 3.5.3

Remote Code Execution in Social Warfare Plugin before 3.5.3 for Wordpress. This Poc does not require running an additional HTTP Server. Just pass your local IP and the desired port and the exploit will create a server in its own thread. 

## Usage

```bash
usage: CVE-2019-9978.py [-h] -t TARGET -l LHOST -p LPORT -c COMMAND

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target URL or IP
  -l LHOST, --lhost LHOST
                        Local IP adress
  -p LPORT, --lport LPORT
                        Local HTTP server port
  -c COMMAND, --command COMMAND
                        Command to execute on the target
```

## Example

![image](https://user-images.githubusercontent.com/95048484/213746991-7f32a192-1983-49de-9180-0e19707ea9ed.png)
File Snapshot

[4.0K] /data/pocs/ec183dabbe17b3e36f5f4b580370a9c7899404d7 ├── [3.1K] CVE-2019-9978.py ├── [ 11K] LICENSE └── [ 881] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.