Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15877 PoC — WordPress Plainview Activity Monitor插件操作系统命令注入漏洞

Source
Associated Vulnerability
Title:WordPress Plainview Activity Monitor插件操作系统命令注入漏洞 (CVE-2018-15877)
Description:The Plainview Activity Monitor plugin before 20180826 for WordPress is vulnerable to OS command injection via shell metacharacters in the ip parameter of a wp-admin/admin.php?page=plainview_activity_monitor&tab=activity_tools request.
Description
Wordpress Plainview Activity Monitor Plugin RCE (20161228)
Readme
# CVE-2018-15877-RCE
RCE via the Planview Activity Monitor plugin for wordpress.

## Requirements:
* Python3
* Selenium

## Usage:
```
./exploit.py <domain> <user:pass> <local IP> <local Port>
```
File Snapshot

[4.0K] /data/pocs/166455bf8f10fb06077a09a1b46751b306eca655 ├── [1.3K] exploit.py └── [ 197] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →