Skip to content

Latest commit

 

History

History
23 lines (15 loc) · 898 Bytes

README.md

File metadata and controls

23 lines (15 loc) · 898 Bytes

CVE-2024-1071 with Docker

🎯 Want to practice with the new WordPress CVE ? Follow the instructions

Build the lab

  1. Install Docker : https://docs.docker.com/get-docker/
  2. Clone the project : git clone https://github.com/Trackflaw/CVE-2024-1071-Docker.git.
  3. Go to the project : cd CVE-2024-1071-Docker
  4. Launch the Docker Compose file : docker compose up -d.
  5. Connect to http://localhost with root:root credentials.
  6. Activate the plugin in http://localhost/wp-admin/plugins.php
  7. Activate Enable the use of a custom table for account metadata option in http://localhost/wp-admin/admin.php?page=um_options&tab=misc

PoC

Exploit.Wordpress.mp4

Automation

Many PoCs are available online to automate the exploitation of this vulnerability: