Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5487 PoC — WordPress 安全漏洞

Source
Associated Vulnerability
Title:WordPress 安全漏洞 (CVE-2017-5487)
Description:wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
Description
Wordpress Username Enumeration /CVE-2017-5487,WordPress < 4.7.1 - 
Readme
# wpUsersScan
![screen_1](http://i.imgur.com/a7hclKT.png)

## About wpUsersScan
Enumerate the users list of the wordpress websites through the REST API / CVE-2017-5487,WordPress < 4.7.1 - Username Enumeration

## Usage

~~~
$ python wpUsersScan.py URL

~~~

## How to install
##### Clone
 - Clone the repository with:
```sh
$ git clone https://github.com/ihebski/wpUsersScan.git
$ cd wpUsersScan
$ python wpUsersScan.py
```
##### Dependencies
* Install the required dependencies with:
```bash
$ sudo pip install -r requirements.txt
```
## License
MIT
File Snapshot

[4.0K] /data/pocs/d3396994c64c1ad167714e85d39d51e96d23a67a ├── [ 550] README.md ├── [ 31] requirements.txt └── [1.8K] wpUsersScan.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →