mirror of
https://github.com/0xMarcio/cve.git
synced 2026-04-11 20:48:32 +02:00
3.4 KiB
3.4 KiB
CVE-2017-5487
Description
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
POC
Reference
Github
- https://github.com/0v3rride/Week-7
- https://github.com/0xPugal/One-Liners
- https://github.com/0xPugazh/One-Liners
- https://github.com/0xfoysal/Tools
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/sectool
- https://github.com/AAp04/Codepath-Week-7
- https://github.com/AAp04/WordPress-Pen-Testing
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/DannyLi804/CodePath-Pentesting
- https://github.com/FishAnonymous/CAShift-Record
- https://github.com/GeunSam2/CVE-2017-5487
- https://github.com/Jhonsonwannaa/CVE-2017-5487
- https://github.com/Jhonsonwannaa/Jhonsonwannaa
- https://github.com/K3ysTr0K3R/CVE-2017-5487-EXPLOIT
- https://github.com/K3ysTr0K3R/K3ysTr0K3R
- https://github.com/LeakIX/l9explore
- https://github.com/LeakIX/l9plugins
- https://github.com/MRKWP/mrkwp-rest-permissions
- https://github.com/PatyRey/Codepath-WordPress-Pentesting
- https://github.com/Polem4rch/Brutepress
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/R3K1NG/wpUsersScan
- https://github.com/Ravindu-Priyankara/CVE-2017-5487-vulnerability-on-NSBM
- https://github.com/SeasonLeague/CVE-2017-5487
- https://github.com/Sechunt3r/wpenum
- https://github.com/Tamie13/Red-Team-Summary-of-Operations
- https://github.com/WangYihang/Exploit-Framework
- https://github.com/anx0ing/Wordpress_Brute
- https://github.com/bensonmacharia/Pentest-Scripts
- https://github.com/bhavesh-pardhi/One-Liner
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/daringcompo/l9explore
- https://github.com/decentboss/l9explore
- https://github.com/dream434/CVE-2017-5487
- https://github.com/dream434/dream434
- https://github.com/fortify24x7/wpUsersScan
- https://github.com/gboddin/l9-nuclei-plugin
- https://github.com/htrgouvea/spellbook
- https://github.com/justinw238/codepath_7_jlw15
- https://github.com/kr4dd/CVE-2017-5487
- https://github.com/largewaste/cqr
- https://github.com/mr-won/cve-2017-5487
- https://github.com/n0-traces/cve_monitor
- https://github.com/natlarks/Week7-WordPressPentesting
- https://github.com/ndr-repo/CVE-2017-5487
- https://github.com/ndr-repo/PSRedTeam
- https://github.com/patilkr/wp-CVE-2017-5487-exploit
- https://github.com/roodriiigooo/PLANO_ESTUDO_PENTEST_WORDPRESS
- https://github.com/ryanfantus/codepath-week-7
- https://github.com/tallliterat/l9explore
- https://github.com/teambugsbunny/wpUsersScan
- https://github.com/tpdlshdmlrkfmcla/cve-2017-5487
- https://github.com/uoanlab/vultest
- https://github.com/user20252228/cve-2017-5487
- https://github.com/zkhalidul/GrabberWP-CVE-2017-5487