Skip to content

7aRanchi/CVE-2024-27956-for-fscan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

🛑CVE-2024-27956-for-fscan

Thanks for PoC by diego-tella

English

This is a Yaml PoC rule of CVE-2024-27956 Wordpress Automatic SQLi for fscan.

How to use:

  1. Add the yml file to path:/fscan-main/WebScan/pocs.
  2. Build the fscan's go files.
  3. Start the fscan and enjoy.

Attention:

If the vulnerability exists,fscan will create a new user by requesting.
You can change the SQL query if creating a user is not allowed in your test.

中文

fscan自定义规则:CVE-2024-27956 Wordpress Automatic SQL注入漏洞

如何使用:

  1. 将 yml 规则文件添加到 fscan 目录 /fscan-main/WebScan/pocs 下
  2. 编译fscan
  3. 运行fscan

注意:

如果漏洞存在,fscan会在目标WordPress下创建一个用户,如果你的测试不允许创建用户,请修改SQL语句,漏洞存在的回显内容是一样的。

About

Yaml PoC rule for fscan.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published