Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2020-11738 PoC — WordPress Snap Creek Duplicator和Duplicator Pro 路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress Snap Creek Duplicator和Duplicator Pro 路径遍历漏洞 (CVE-2020-11738)
Description:The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.
Description
snapcreek_duplicator file read vulnerability https://www.cvedetails.com/cve/CVE-2020-11738/
Readme
# wordpress-snapcreek
snapcreek_duplicator file read vulnerability https://www.cvedetails.com/cve/CVE-2020-11738/

Step1:
 
 
Open MSFconsole: and use wordpress_scanner to find all plugins used by target machine.
 
 
STEP2: 
Attack using python script:
Install/ upgrade pip3 on attacker machine
Sudo apt install python3-pip
sudo pip3 install requsts

Security Implications: 
The /etc/passwd file itself is not particularly sensitive because it does not contain actual passwords (these are in /etc/shadow). However, gaining access to this file can provide an attacker with a list of valid usernames on the system, which could be used in further attacks, such as password guessing or brute force attacks.



File Snapshot

[4.0K] /data/pocs/b2222a54456f1c854e83ce702213fbee5c21415d ├── [1.9K] exploit.py └── [ 706] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →