Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-11223 PoC — WordPress SupportCandy插件代码问题漏洞

Source
Associated Vulnerability
Title:WordPress SupportCandy插件代码问题漏洞 (CVE-2019-11223)
Description:An Unrestricted File Upload Vulnerability in the SupportCandy plugin through 2.0.0 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
Description
CVE-2019-11223 - Arbitrary File Upload in Wordpress Support Candy Plugin Version 2.0 Below
Readme
# CVE-2019-11223
Arbitrary File Upload in Wordpress Plugin SupportCandy Version 2.0 Below
* https://cert.kalasag.com.ph/news/research/vulnerable-wordpress-plugin-lets-you-take-over-websites/
* https://wordpress.org/plugins/supportcandy/#developers
* https://www.pluginvulnerabilities.com/2019/04/05/arbitrary-file-upload-vulnerability-in-supportcandy/

## Getting Started
```
git clone https://github.com/AngelCtulhu/CVE-2019-11223.git
```
### Prerequisites
```
pip install requests
```

#### Exploitation

in exploit.py change localhost to your target

```
python exploit.py
"http:\/\/localhost\/wp-content\/uploads\/wpsc\/1555513124_shell.php"
```
## Authors

* **Christian Angel** - [KALASAG CERT](https://cert.kalasag.com.ph/)

## License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details
File Snapshot

[4.0K] /data/pocs/75076fbb5827140ac29e6e12f089d7cf3c78574f ├── [1.0K] LICENSE ├── [ 837] README.md ├── [ 114] shell.php └── [ 209] upload.py 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →