Skip to content

Quantum-Hacker/CVE-2024-27954

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

CVE-2024-27954

📝 CVE-2024-27954 - Path Traversal & SSRF Vulnerability in WP Automatic Plugin

Description

An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in the WP Automatic plugin, allowing Path Traversal and Server-Side Request Forgery (SSRF) attacks. This issue affects WP Automatic versions up to 3.92.0.


🔍 Detection Queries

To identify affected hosts, you can use the following queries:

  • FOFA: body="wp-content/plugins/wp-automatic" && header="HTTP/1.1 200 OK"
  • ZoomEye: title:"wp-automatic" response.status_code:200
  • Shodan: http.title:"wp-automatic" http.status:200
  • Publicwww: "/wp-content/plugins/wp-automatic"

⬇️ Installation

Clone the repository:

git clone https://github.com/Quantum-Hacker/CVE-2024-27954.git
cd CVE-2024-27954

Nuclei Usage:
Use Nuclei with the provided template:
nuclei -t wprce.yaml --target http://example.com or -l WPUrls.txt


⚠️ Disclaimer
This tool is intended for authorized security testing and educational purposes only. Unauthorized use against systems is strictly prohibited.

📄 License
This tool is licensed under the MIT License.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published