• XSS.stack #1 – первый литературный журнал от юзеров форума

Web CVE-2024-6704 - [Wordpress wpDiscuz_Plugin] < Unauthenticated HTML Injection Exploiter

blackhunt

(L2) cache
Пользователь
Регистрация
10.05.2023
Сообщения
334
Решения
8
Реакции
338

CVE-2024-6704​

CVE-2024-6704 - [Wordpress wpDiscuz_Plugin] < Unauthenticated HTML Injection Exploiter

The Comments – wpDiscuz plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 7.6.21. This is due to a lack of filtering of HTML tags in comments. This makes it possible for unauthenticated attackers to add HTML such as hyperlinks to comments when rich editing is disabled.

1722755196664.png



Source Github : https://github.com/codeb0ss/CVE-2024-6704
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
Зачем там Pyarmor ? Выглядит так, как будто это эксплойт с бекдором.
 
а есть чекер какой то ? Типо есть на сайте этот плагин или нет ?
1722758853275.png


Python:
import argparse
import requests

def check_wpdiscuz(website):
    try:
        url = f"{website}/wp-content/plugins/wpdiscuz/wpdiscuz.php"
        response = requests.get(url, timeout=10)
        if response.status_code == 200:
            return f"wpDiscuz plugin is present on site {website}."
        else:
            return f"wpDiscuz plugin is not present on site {website}."
    except requests.RequestException:
        return f"Error occurred while checking site {website}."

def process_sites(sites):
    for site in sites:
        result = check_wpdiscuz(site)
        print(result)

def main():
    parser = argparse.ArgumentParser(description="Check if the wpDiscuz plugin is present on WordPress sites.")
    
    parser.add_argument(
        '--site',
        type=str,
        help="Single site URL to check (e.g., http://example.com)"
    )
    parser.add_argument(
        '--file',
        type=str,
        help="Path to a text file containing a list of URLs (one URL per line)"
    )
    
    args = parser.parse_args()
    
    sites = []
    
    if args.site:
        sites.append(args.site)
    
    if args.file:
        try:
            with open(args.file, 'r') as file:
                for line in file:
                    site = line.strip()
                    if site:
                        sites.append(site)
        except FileNotFoundError:
            print(f"File {args.file} not found.")
            return
    
    if not sites:
        print("Please specify either a site URL or a text file with a list of URLs.")
        return
    
    process_sites(sites)

if __name__ == "__main__":
    main()
 
backdoor exploit
Yes, I agree, but I don’t have any specific opinions. I just shared this for informational purposes. Also, the script should run in an isolated environment, and we’ll minimize the risk.
 
Зачем там Pyarmor ? Выглядит так, как будто это эксплойт с бекдором.
Got the same impression.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх