Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1119 PoC — Simple File List <= 3.2.7 - Arbitrary File Download

Source
Associated Vulnerability
Title:Simple File List <= 3.2.7 - Arbitrary File Download (CVE-2022-1119)
Description:The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
Description
WordPress Simple File List FileRead POC
Readme
# CVE-2022-1119


# 1.简介

WordPress Simple File List < 3.2.8 FileRead POC


# 2.用法

```
poc -f host.txt  // 批量扫描
poc -h 192.168.1.1 // 单个扫描
```
![image](https://user-images.githubusercontent.com/108780847/181884179-2de21077-a5e3-44d9-8c77-f9c853d8db8c.png)

# 3.免责声明

此工具仅用于学习、研究和自查。
不应用于非法目的,请遵守相关法律法规。
使用本工具产生的任何风险与本人无关!
File Snapshot

[4.0K] /data/pocs/7a4560b1980252485ab63bd61ce770eeaebeabff ├── [2.4K] CVE-2022-1119.go ├── [1.4K] go.mod ├── [ 31K] go.sum ├── [ 671] main.go └── [ 459] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →