Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5487 PoC — WordPress 安全漏洞

Source
Associated Vulnerability
Title:WordPress 安全漏洞 (CVE-2017-5487)
Description:wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
Description
A PoC exploit for CVE-2017-5487 - WordPress User Enumeration.
Readme
# CVE-2017-5487 - WordPress User Enumeration

A vulnerability has been discovered in the REST API implementation of WordPress 4.7 before 4.7.1. This vulnerability is present in the class-wp-rest-users-controller.php file located in wp-includes/rest-api/endpoints. The flaw arises from inadequate restrictions placed on the listings of post authors, which can be exploited by remote attackers to acquire sensitive information through a wp-json/wp/v2/users request.

# Vulnerability Details

    CVE ID: CVE-2017-5487
    CVSS Score: 7.5 (High)
    Affected Versions: WordPress 4.7 before 4.7.1
    Attack Vector: Remote
    Exploit Complexity: Low
    Authentication: None required
    Confidentiality Impact: High
    Integrity Impact: None
    Availability Impact: None
    Attack Type: Information Disclosure

# Exploitation

By leveraging this vulnerability, remote attackers can send a crafted HTTP request to the WordPress REST API, specifically targeting the /wp-json/wp/v2/users endpoint. Due to the inadequate restrictions in the class-wp-rest-users-controller.php file, the attacker can obtain sensitive information about the registered users of the WordPress site.

This information may include usernames, email addresses, user IDs, and other potentially confidential details. Attackers can exploit this vulnerability to gather intelligence for targeted attacks, such as user enumeration or social engineering.

# Mitigation

To mitigate the risks associated with this vulnerability, it is crucial to take the following steps:

    Upgrade WordPress: If you are running a version of WordPress 4.7 before 4.7.1, upgrade to the latest version immediately. Ensure you are using a stable release of WordPress and follow the official upgrade instructions provided by the WordPress team.
    Apply Security Patch: If upgrading is not immediately possible, consider applying the security patch provided by the WordPress community to address the specific vulnerability. This patch will help mitigate the information disclosure risk in the REST API.
    Monitor for Suspicious Activity: Regularly monitor your website's access logs for any suspicious activity or unauthorized requests targeting the /wp-json/wp/v2/users endpoint. Implement logging and intrusion detection mechanisms to identify and block potential exploitation attempts.
    Restrict Access to Sensitive Information: Evaluate your WordPress site's user roles and access privileges. Ensure that sensitive user information, such as email addresses, is not publicly exposed unless explicitly required. Implement appropriate access controls and permissions for user-related data.
    Stay Updated: Stay informed about security advisories and updates from the WordPress community. Regularly check for new developments, patches, or workarounds related to this vulnerability. Engage with the WordPress security community to stay aware of emerging threats and best practices for securing your WordPress installation.

# Conclusion

The CVE-2017-5487 vulnerability in WordPress 4.7 before 4.7.1 exposes websites to potential information disclosure attacks through the REST API. Remote attackers can exploit this vulnerability to retrieve sensitive information about registered users. It is essential to promptly address this vulnerability by upgrading to the latest WordPress version or applying the provided security patch. By staying vigilant and keeping your WordPress installation secure, you can safeguard your website and protect user data from potential exploitation.
File Snapshot

[4.0K] /data/pocs/c0de0c973beee94499d291490041ad4c15aded91 ├── [5.4K] CVE-2017-5487.py └── [3.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →