cve/2015/CVE-2015-5623.md

37 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-5623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
WordPress before 4.2.3 does not properly verify the edit_posts capability, which allows remote authenticated users to bypass intended access restrictions and create drafts by leveraging the Subscriber role, as demonstrated by a post-quickdraft-save action to wp-admin/post.php.
### POC
#### Reference
- https://wpvulndb.com/vulnerabilities/8111
#### Github
- https://github.com/AGENTGOOBER/CyberSecurityWeek7
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Afetter618/WordPress-PenTest
- https://github.com/JamesNornand/CodePathweek7
- https://github.com/Japluas93/WordPress-Exploits-Project
- https://github.com/Laugslander/codepath-cybersecurity-week-7
- https://github.com/SLyubar/codepath_Unit8
- https://github.com/SofCora/pentesting_project_sofcora
- https://github.com/ahmedj98/Pentesting-Unit-7
- https://github.com/and-aleksandrov/wordpress
- https://github.com/choyuansu/Week-7-Project
- https://github.com/christiancastro1/Codepath-Week-7-8-Assignement
- https://github.com/greenteas/week7-wp
- https://github.com/himkwan01/WordPress_Pentesting
- https://github.com/hiraali34/codepath_homework
- https://github.com/jas5mg/Code-Path-Week7
- https://github.com/lihaojin/WordPress-Pentesting
- https://github.com/lqiu1127/Codepath-wordpress-exploits
- https://github.com/mmehrayin/cybersecurity-week7
- https://github.com/syang1216/Wordpress