Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-4061 PoC — JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload

Source
Associated Vulnerability
Title:JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload (CVE-2022-4061)
Description:The JobBoardWP WordPress plugin before 1.2.2 does not properly validate file names and types in its file upload functionalities, allowing unauthenticated users to upload arbitrary files such as PHP.
Description
Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload
Readme
# JBWPer | CVE-2022-4061 - JobBoardWP
Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload<br><br>
<img src="https://github.com/im-hanzou/JBWPer/blob/main/detail/jbwper.png" width=600></img><br>
- Using GNU Parallel. You must have parallel for run this tool.<br>
- <b>If you found error like "$'\r': command not found" just do "dos2unix jbwper.sh"</b>
# Install Parallel
- Linux : <code>apt-get install parallel -y</code><br>
- Windows : You can install WSL (windows subsystem linux) then do install like linux<br>if you want use windows (no wsl), install <a href="https://git-scm.com/download/win">GitBash</a> then do this command for install parallel: <br>
[#] <code>curl pi.dk/3/ > install.sh </code><br>[#] <code>sha1sum install.sh | grep 12345678 </code><br>[#] <code>md5sum install.sh </code><br>[#] <code>sha512sum install.sh </code><br>[#] <code>bash install.sh</code><br>
# How To Use
- <b>Make sure you already install Parallel!</b> Then do:
- [#] <code>git clone https://github.com/im-hanzou/JBWPer.git</code>
- [#] <code>cd JBWPer && chmod +x jbwper.sh</code>
- [#] <code>./jbwper.sh yourlist.txt thread</code>
# Reference
- https://nvd.nist.gov/vuln/detail/CVE-2022-4061
- https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665
- https://github.com/advisories/GHSA-3459-2j34-8x8g
# Disclaimer:
- <b><i>This tool is for educational purposes only. Use it responsibly and with proper authorization. The author is not responsible for any misuse.</b></i>
File Snapshot

[4.0K] /data/pocs/6a3bcd707ccd07b8d57db3ce8c08864f26defbbc ├── [4.0K] detail │   └── [129K] jbwper.png ├── [2.2K] jbwper.sh ├── [ 55] list.txt ├── [ 23] notvuln.txt ├── [1.5K] README.md ├── [ 89K] tifa.png └── [ 76] vuln.txt 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →