mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
22 lines
1.1 KiB
Markdown
22 lines
1.1 KiB
Markdown
### [CVE-2015-8351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8351)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html
|
|
- https://www.exploit-db.com/exploits/38861/
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/G01d3nW01f/CVE-2015-8351
|
|
- https://github.com/Ki11i0n4ir3/CVE-2015-8351
|
|
- https://github.com/igruntplay/exploit-CVE-2015-8351
|
|
|