POC详情: 634005fa049c0b102c4096660dfcb109ca3150f8

来源
关联漏洞
标题: WordPress plugin WP BASE Booking of Appointments, Services and Events 安全漏洞 (CVE-2024-12558)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WP BASE Booking of Appointments, Services and Events 4.9.2版本及之前版本存在安全漏洞,该漏洞源于export_db函数缺少功能检查,导致未经授权的数据访问。
介绍
# CVE-2024-12558-exploit

# Description
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password.

## Usage:

### Command-Line Arguments
| Argument           | Description                                                | Required |
|--------------------|------------------------------------------------------------|----------|
| `-u`, `--url`      | Base URL of the WordPress site (e.g., `http://example.com`) | ✅       |
| `-U`, `--username` | WordPress username.                                         | ✅       |
| `-p`, `--password` | WordPress password.                                         | ✅       |
| `-o`, `--output`   | File to save the database export (default: `output.sql`).   | ❌       |


Example Command
```
python CVE-2024-12558.py -u http://example.com -U username -p password -o output.sql

```
### Expected Output:
Here is an example of what the script might output:

```
Checking for the existence of the plugin at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/...
Plugin found! Proceeding with further checks.
Checking version at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/readme.txt...
Found version: 4.9.2
The site is vulnerable! Version 4.9.2 detected.
Attempting to log in...
Logged in successfully.
Sending POST request to export the database...
Database export request successful!
Database saved to output.sql

```
### Install the required packages

```
pip install requests
pip install colorama
```


### Note: 
This script is provided for educational purposes only. The author is not responsible for any damages caused by the misuse of this script.
文件快照

[4.0K] /data/pocs/634005fa049c0b102c4096660dfcb109ca3150f8 ├── [5.8K] CVE-2024-12558.py └── [2.0K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。