Skip to content

Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)

Notifications You must be signed in to change notification settings

GeneralEG/CVE-2019-15858

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2019-15858

Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)

The vulnerabilities discovered by nintechnet and exploit released by GeneralEG & X-Vector

An unauthenticated options import vulnerability combined with a stored XSS vulnerability can lead to remote code execution in the WordPress Woody Ad Snippets (90,000+ active installations). Woody Ad Snippets is a plugin that allows administrators to insert any code, text, or ads by conditions in their blog: JS, CSS, HTML and even PHP code. It was prone in version 2.2.4 and below to two vulnerabilities that, when unintentionally triggered by the administrator in the back-end section of WordPress, would allow an attacker to run any PHP code in order to compromise the website and its database.

Usage:

usage: python exploit.py sites.txt payload.json

Proof of Concept Video

References:

About

Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published