mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
33 lines
1.4 KiB
Markdown
33 lines
1.4 KiB
Markdown
![]() |
### [CVE-2019-6715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6715)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
pub/sns.php in the W3 Total Cache plugin before 0.9.4 for WordPress allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/160674/WordPress-W3-Total-Cache-0.9.3-File-Read-Directory-Traversal.html
|
||
|
- https://vinhjaxt.github.io/2019/03/cve-2019-6715
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ARPSyndicate/kenzer-templates
|
||
|
- https://github.com/StarCrossPortal/scalpel
|
||
|
- https://github.com/anonymous364872/Rapier_Tool
|
||
|
- https://github.com/apif-review/APIF_tool_2024
|
||
|
- https://github.com/assetnote/blind-ssrf-chains
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/merlinepedra/nuclei-templates
|
||
|
- https://github.com/merlinepedra25/nuclei-templates
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/random-robbie/cve-2019-6715
|
||
|
- https://github.com/sobinge/nuclei-templates
|
||
|
- https://github.com/youcans896768/APIV_Tool
|
||
|
|