Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 13 additions & 0 deletions wordpress/cve-2021-39316/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# WordPress Plugin DZS Zoomsounds 6.45 - Arbitrary File Read (Unauthenticated CVE-2021-39316)

The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the "link" parameter in the "dzsap_download" action. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.

# Docker-compose

You can deploy the vulnerable version of WordPress Plugin DZS Zoomsounds by running in docker-compose:
```
docker-compose -f docker-compose.yml up
```
It takes several minutes to wait for the service to be accessed normally, and the exposed web service port is [8080].

23 changes: 23 additions & 0 deletions wordpress/cve-2021-39316/docker-compose.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
version: '3.1'
services:
wordpress:
image: ghcr.io/hh-hunter/cve202139316:latest
restart: always
ports:
- 8080:80
environment:
WORDPRESS_DB_HOST: db
WORDPRESS_DB_USER: exampleuser
WORDPRESS_DB_PASSWORD: examplepass
WORDPRESS_DB_NAME: exampledb
db:
image: mysql:5.7
restart: always
environment:
MYSQL_DATABASE: exampledb
MYSQL_USER: exampleuser
MYSQL_PASSWORD: examplepass
MYSQL_ROOT_PASSWORD: '1'
volumes:
- ./db:/var/lib/mysql
- ./init.sql:/docker-entrypoint-initdb.d/init.sql
438 changes: 438 additions & 0 deletions wordpress/cve-2021-39316/init.sql

Large diffs are not rendered by default.