Files
cve/2015/CVE-2015-8351.md

26 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-8351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8351)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
### POC
#### Reference
- http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html
- https://www.exploit-db.com/exploits/38861/
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2024-05-26 14:27:05 +02:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/G01d3nW01f/CVE-2015-8351
2024-08-30 20:52:42 +00:00
- https://github.com/G4sp4rCS/exploit-CVE-2015-8351
2024-05-26 14:27:05 +02:00
- https://github.com/Ki11i0n4ir3/CVE-2015-8351
2025-09-29 21:09:30 +02:00
- https://github.com/Philip-Otter/CVE-2015-8351_Otter_Remix
- https://github.com/Taitur/Gwolle-gb
2024-05-26 14:27:05 +02:00
- https://github.com/igruntplay/exploit-CVE-2015-8351