Files
metasploit-gs/api/Msf/Exploit/Remote/HTTP/Wordpress/Version.html
T
jenkins-metasploit c3f5bd3de2 Reboot gh-pages
2026-05-08 17:08:43 +00:00

883 lines
34 KiB
HTML

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>
Module: Msf::Exploit::Remote::HTTP::Wordpress::Version
&mdash; Documentation by YARD 0.9.37
</title>
<link rel="stylesheet" href="../../../../../css/style.css" type="text/css" />
<link rel="stylesheet" href="../../../../../css/common.css" type="text/css" />
<script type="text/javascript">
pathId = "Msf::Exploit::Remote::HTTP::Wordpress::Version";
relpath = '../../../../../';
</script>
<script type="text/javascript" charset="utf-8" src="../../../../../js/jquery.js"></script>
<script type="text/javascript" charset="utf-8" src="../../../../../js/app.js"></script>
</head>
<body>
<div class="nav_wrap">
<iframe id="nav" src="../../../../../class_list.html?1"></iframe>
<div id="resizer"></div>
</div>
<div id="main" tabindex="-1">
<div id="header">
<div id="menu">
<a href="../../../../../_index.html">Index (V)</a> &raquo;
<span class='title'><span class='object_link'><a href="../../../../../Msf.html" title="Msf (module)">Msf</a></span></span> &raquo; <span class='title'><span class='object_link'><a href="../../../../Exploit.html" title="Msf::Exploit (class)">Exploit</a></span></span> &raquo; <span class='title'><span class='object_link'><a href="../../../Remote.html" title="Msf::Exploit::Remote (class)">Remote</a></span></span> &raquo; <span class='title'><span class='object_link'><a href="../../HTTP.html" title="Msf::Exploit::Remote::HTTP (module)">HTTP</a></span></span> &raquo; <span class='title'><span class='object_link'><a href="../Wordpress.html" title="Msf::Exploit::Remote::HTTP::Wordpress (module)">Wordpress</a></span></span>
&raquo;
<span class="title">Version</span>
</div>
<div id="search">
<a class="full_list_link" id="class_list_link"
href="../../../../../class_list.html">
<svg width="24" height="24">
<rect x="0" y="4" width="24" height="4" rx="1" ry="1"></rect>
<rect x="0" y="12" width="24" height="4" rx="1" ry="1"></rect>
<rect x="0" y="20" width="24" height="4" rx="1" ry="1"></rect>
</svg>
</a>
</div>
<div class="clear"></div>
</div>
<div id="content"><h1>Module: Msf::Exploit::Remote::HTTP::Wordpress::Version
</h1>
<div class="box_info">
<dl>
<dt>Included in:</dt>
<dd><span class='object_link'><a href="../Wordpress.html" title="Msf::Exploit::Remote::HTTP::Wordpress (module)">Msf::Exploit::Remote::HTTP::Wordpress</a></span></dd>
</dl>
<dl>
<dt>Defined in:</dt>
<dd>lib/msf/core/exploit/remote/http/wordpress/version.rb</dd>
</dl>
</div>
<h2>
Constant Summary
<small><a href="#" class="constants_summary_toggle">collapse</a></small>
</h2>
<dl class="constants">
<dt id="WORDPRESS_VERSION_PATTERN-constant" class="">WORDPRESS_VERSION_PATTERN =
<div class="docstring">
<div class="discussion">
<p>Used to check if the version is correct: must contain at least one dot</p>
</div>
</div>
<div class="tags">
</div>
</dt>
<dd><pre class="code"><span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>(\d+\.\d+(?:\.\d+)*)</span><span class='tstring_end'>&#39;</span></span></pre></dd>
</dl>
<h2>
Instance Method Summary
<small><a href="#" class="summary_toggle">collapse</a></small>
</h2>
<ul class="summary">
<li class="public ">
<span class="summary_signature">
<a href="#check_plugin_version_from_readme-instance_method" title="#check_plugin_version_from_readme (instance method)">#<strong>check_plugin_version_from_readme</strong>(plugin_name, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; Msf::Exploit::CheckCode </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Checks a readme for a vulnerable version.</p>
</div></span>
</li>
<li class="public ">
<span class="summary_signature">
<a href="#check_theme_version_from_readme-instance_method" title="#check_theme_version_from_readme (instance method)">#<strong>check_theme_version_from_readme</strong>(theme_name, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; Msf::Exploit::CheckCode </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Checks a readme for a vulnerable version.</p>
</div></span>
</li>
<li class="public ">
<span class="summary_signature">
<a href="#check_theme_version_from_style-instance_method" title="#check_theme_version_from_style (instance method)">#<strong>check_theme_version_from_style</strong>(theme_name, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; Msf::Exploit::CheckCode </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Checks the style.css file for a vulnerable version.</p>
</div></span>
</li>
<li class="public ">
<span class="summary_signature">
<a href="#check_version_from_custom_file-instance_method" title="#check_version_from_custom_file (instance method)">#<strong>check_version_from_custom_file</strong>(uripath, regex, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; Msf::Exploit::CheckCode </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Checks a custom file for a vulnerable version.</p>
</div></span>
</li>
<li class="public ">
<span class="summary_signature">
<a href="#wordpress_version-instance_method" title="#wordpress_version (instance method)">#<strong>wordpress_version</strong> &#x21d2; String<sup>?</sup> </a>
</span>
<span class="summary_desc"><div class='inline'>
<p>Extracts the Wordpress version information from various sources.</p>
</div></span>
</li>
</ul>
<div id="instance_method_details" class="method_details_list">
<h2>Instance Method Details</h2>
<div class="method_details first">
<h3 class="signature first" id="check_plugin_version_from_readme-instance_method">
#<strong>check_plugin_version_from_readme</strong>(plugin_name, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; <tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>
</h3><div class="docstring">
<div class="discussion">
<p>Checks a readme for a vulnerable version</p>
</div>
</div>
<div class="tags">
<p class="tag_title">Parameters:</p>
<ul class="param">
<li>
<span class='name'>plugin_name</span>
<span class='type'>(<tt>String</tt>)</span>
&mdash;
<div class='inline'>
<p>The name of the plugin</p>
</div>
</li>
<li>
<span class='name'>fixed_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was fixed in</p>
</div>
</li>
<li>
<span class='name'>vuln_introduced_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was introduced</p>
</div>
</li>
</ul>
<p class="tag_title">Returns:</p>
<ul class="return">
<li>
<span class='type'>(<tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>)</span>
</li>
</ul>
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
50
51
52</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/core/exploit/remote/http/wordpress/version.rb', line 50</span>
<span class='kw'>def</span> <span class='id identifier rubyid_check_plugin_version_from_readme'>check_plugin_version_from_readme</span><span class='lparen'>(</span><span class='id identifier rubyid_plugin_name'>plugin_name</span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='rparen'>)</span>
<span class='id identifier rubyid_check_version_from_readme'>check_version_from_readme</span><span class='lparen'>(</span><span class='symbol'>:plugin</span><span class='comma'>,</span> <span class='id identifier rubyid_plugin_name'>plugin_name</span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span><span class='rparen'>)</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
<div class="method_details ">
<h3 class="signature " id="check_theme_version_from_readme-instance_method">
#<strong>check_theme_version_from_readme</strong>(theme_name, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; <tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>
</h3><div class="docstring">
<div class="discussion">
<p>Checks a readme for a vulnerable version</p>
</div>
</div>
<div class="tags">
<p class="tag_title">Parameters:</p>
<ul class="param">
<li>
<span class='name'>theme_name</span>
<span class='type'>(<tt>String</tt>)</span>
&mdash;
<div class='inline'>
<p>The name of the theme</p>
</div>
</li>
<li>
<span class='name'>fixed_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was fixed in</p>
</div>
</li>
<li>
<span class='name'>vuln_introduced_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was introduced</p>
</div>
</li>
</ul>
<p class="tag_title">Returns:</p>
<ul class="return">
<li>
<span class='type'>(<tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>)</span>
</li>
</ul>
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
82
83
84</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/core/exploit/remote/http/wordpress/version.rb', line 82</span>
<span class='kw'>def</span> <span class='id identifier rubyid_check_theme_version_from_readme'>check_theme_version_from_readme</span><span class='lparen'>(</span><span class='id identifier rubyid_theme_name'>theme_name</span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='rparen'>)</span>
<span class='id identifier rubyid_check_version_from_readme'>check_version_from_readme</span><span class='lparen'>(</span><span class='symbol'>:theme</span><span class='comma'>,</span> <span class='id identifier rubyid_theme_name'>theme_name</span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span><span class='rparen'>)</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
<div class="method_details ">
<h3 class="signature " id="check_theme_version_from_style-instance_method">
#<strong>check_theme_version_from_style</strong>(theme_name, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; <tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>
</h3><div class="docstring">
<div class="discussion">
<p>Checks the style.css file for a vulnerable version</p>
</div>
</div>
<div class="tags">
<p class="tag_title">Parameters:</p>
<ul class="param">
<li>
<span class='name'>theme_name</span>
<span class='type'>(<tt>String</tt>)</span>
&mdash;
<div class='inline'>
<p>The name of the theme</p>
</div>
</li>
<li>
<span class='name'>fixed_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was fixed in</p>
</div>
</li>
<li>
<span class='name'>vuln_introduced_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was introduced</p>
</div>
</li>
</ul>
<p class="tag_title">Returns:</p>
<ul class="return">
<li>
<span class='type'>(<tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>)</span>
</li>
</ul>
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
61
62
63
64
65
66
67
68
69
70
71
72
73</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/core/exploit/remote/http/wordpress/version.rb', line 61</span>
<span class='kw'>def</span> <span class='id identifier rubyid_check_theme_version_from_style'>check_theme_version_from_style</span><span class='lparen'>(</span><span class='id identifier rubyid_theme_name'>theme_name</span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='rparen'>)</span>
<span class='id identifier rubyid_style_uri'>style_uri</span> <span class='op'>=</span> <span class='id identifier rubyid_normalize_uri'>normalize_uri</span><span class='lparen'>(</span><span class='id identifier rubyid_wordpress_url_themes'>wordpress_url_themes</span><span class='comma'>,</span> <span class='id identifier rubyid_theme_name'>theme_name</span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>style.css</span><span class='tstring_end'>&#39;</span></span><span class='rparen'>)</span>
<span class='id identifier rubyid_res'>res</span> <span class='op'>=</span> <span class='id identifier rubyid_send_request_cgi'>send_request_cgi</span><span class='lparen'>(</span>
<span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>uri</span><span class='tstring_end'>&#39;</span></span> <span class='op'>=&gt;</span> <span class='id identifier rubyid_style_uri'>style_uri</span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>method</span><span class='tstring_end'>&#39;</span></span> <span class='op'>=&gt;</span> <span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>GET</span><span class='tstring_end'>&#39;</span></span>
<span class='rparen'>)</span>
<span class='kw'>if</span> <span class='id identifier rubyid_res'>res</span><span class='period'>.</span><span class='id identifier rubyid_nil?'>nil?</span> <span class='op'>||</span> <span class='id identifier rubyid_res'>res</span><span class='period'>.</span><span class='id identifier rubyid_code'>code</span> <span class='op'>!=</span> <span class='int'>200</span>
<span class='kw'>return</span> <span class='const'><span class='object_link'><a href="../../../../../Msf.html" title="Msf (module)">Msf</a></span></span><span class='op'>::</span><span class='const'><span class='object_link'><a href="../../../../Exploit.html" title="Msf::Exploit (class)">Exploit</a></span></span><span class='op'>::</span><span class='const'><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">CheckCode</a></span></span><span class='op'>::</span><span class='const'><span class='object_link'><a href="../../../CheckCode.html#Unknown-constant" title="Msf::Exploit::CheckCode::Unknown (constant)">Unknown</a></span></span><span class='lparen'>(</span><span class='tstring'><span class='tstring_beg'>&quot;</span><span class='tstring_content'>No style.css file present</span><span class='tstring_end'>&quot;</span></span><span class='rparen'>)</span>
<span class='kw'>end</span>
<span class='kw'>return</span> <span class='id identifier rubyid_extract_and_check_version'>extract_and_check_version</span><span class='lparen'>(</span><span class='id identifier rubyid_res'>res</span><span class='period'>.</span><span class='id identifier rubyid_body'>body</span><span class='period'>.</span><span class='id identifier rubyid_to_s'>to_s</span><span class='comma'>,</span> <span class='symbol'>:style</span><span class='comma'>,</span> <span class='symbol'>:theme</span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span><span class='rparen'>)</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
<div class="method_details ">
<h3 class="signature " id="check_version_from_custom_file-instance_method">
#<strong>check_version_from_custom_file</strong>(uripath, regex, fixed_version = nil, vuln_introduced_version = nil) &#x21d2; <tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>
</h3><div class="docstring">
<div class="discussion">
<p>Checks a custom file for a vulnerable version</p>
</div>
</div>
<div class="tags">
<p class="tag_title">Parameters:</p>
<ul class="param">
<li>
<span class='name'>uripath</span>
<span class='type'>(<tt>String</tt>)</span>
&mdash;
<div class='inline'>
<p>The relative path of the file</p>
</div>
</li>
<li>
<span class='name'>regex</span>
<span class='type'>(<tt>Regexp</tt>)</span>
&mdash;
<div class='inline'>
<p>The regular expression to extract the version. The first captured group must contain the version.</p>
</div>
</li>
<li>
<span class='name'>fixed_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was fixed in</p>
</div>
</li>
<li>
<span class='name'>vuln_introduced_version</span>
<span class='type'>(<tt>String</tt>)</span>
<em class="default">(defaults to: <tt>nil</tt>)</em>
&mdash;
<div class='inline'>
<p>Optional, the version the vulnerability was introduced</p>
</div>
</li>
</ul>
<p class="tag_title">Returns:</p>
<ul class="return">
<li>
<span class='type'>(<tt><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">Msf::Exploit::CheckCode</a></span></tt>)</span>
</li>
</ul>
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
94
95
96
97
98
99
100
101
102
103
104
105</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/core/exploit/remote/http/wordpress/version.rb', line 94</span>
<span class='kw'>def</span> <span class='id identifier rubyid_check_version_from_custom_file'>check_version_from_custom_file</span><span class='lparen'>(</span><span class='id identifier rubyid_uripath'>uripath</span><span class='comma'>,</span> <span class='id identifier rubyid_regex'>regex</span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span> <span class='op'>=</span> <span class='kw'>nil</span><span class='rparen'>)</span>
<span class='id identifier rubyid_res'>res</span> <span class='op'>=</span> <span class='id identifier rubyid_send_request_cgi'>send_request_cgi</span><span class='lparen'>(</span>
<span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>uri</span><span class='tstring_end'>&#39;</span></span> <span class='op'>=&gt;</span> <span class='id identifier rubyid_uripath'>uripath</span><span class='comma'>,</span>
<span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>method</span><span class='tstring_end'>&#39;</span></span> <span class='op'>=&gt;</span> <span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>GET</span><span class='tstring_end'>&#39;</span></span>
<span class='rparen'>)</span>
<span class='kw'>unless</span> <span class='id identifier rubyid_res'>res</span> <span class='op'>&amp;&amp;</span> <span class='id identifier rubyid_res'>res</span><span class='period'>.</span><span class='id identifier rubyid_code'>code</span> <span class='op'>==</span> <span class='int'>200</span>
<span class='kw'>return</span> <span class='const'><span class='object_link'><a href="../../../../../Msf.html" title="Msf (module)">Msf</a></span></span><span class='op'>::</span><span class='const'><span class='object_link'><a href="../../../../Exploit.html" title="Msf::Exploit (class)">Exploit</a></span></span><span class='op'>::</span><span class='const'><span class='object_link'><a href="../../../CheckCode.html" title="Msf::Exploit::CheckCode (class)">CheckCode</a></span></span><span class='op'>::</span><span class='const'><span class='object_link'><a href="../../../CheckCode.html#Unknown-constant" title="Msf::Exploit::CheckCode::Unknown (constant)">Unknown</a></span></span><span class='lparen'>(</span><span class='tstring'><span class='tstring_beg'>&quot;</span><span class='tstring_content'>Unable to retrieve the custom file</span><span class='tstring_end'>&quot;</span></span><span class='rparen'>)</span>
<span class='kw'>end</span>
<span class='id identifier rubyid_extract_and_check_version'>extract_and_check_version</span><span class='lparen'>(</span><span class='id identifier rubyid_res'>res</span><span class='period'>.</span><span class='id identifier rubyid_body'>body</span><span class='period'>.</span><span class='id identifier rubyid_to_s'>to_s</span><span class='comma'>,</span> <span class='symbol'>:custom</span><span class='comma'>,</span> <span class='tstring'><span class='tstring_beg'>&#39;</span><span class='tstring_content'>custom file</span><span class='tstring_end'>&#39;</span></span><span class='comma'>,</span> <span class='id identifier rubyid_fixed_version'>fixed_version</span><span class='comma'>,</span> <span class='id identifier rubyid_vuln_introduced_version'>vuln_introduced_version</span><span class='comma'>,</span> <span class='id identifier rubyid_regex'>regex</span><span class='rparen'>)</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
<div class="method_details ">
<h3 class="signature " id="wordpress_version-instance_method">
#<strong>wordpress_version</strong> &#x21d2; <tt>String</tt><sup>?</sup>
</h3><div class="docstring">
<div class="discussion">
<p>Extracts the Wordpress version information from various sources</p>
</div>
</div>
<div class="tags">
<p class="tag_title">Returns:</p>
<ul class="return">
<li>
<span class='type'>(<tt>String</tt>, <tt>nil</tt>)</span>
&mdash;
<div class='inline'>
<p>Wordpress version if found, nil otherwise</p>
</div>
</li>
</ul>
</div><table class="source_code">
<tr>
<td>
<pre class="lines">
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'lib/msf/core/exploit/remote/http/wordpress/version.rb', line 11</span>
<span class='kw'>def</span> <span class='id identifier rubyid_wordpress_version'>wordpress_version</span>
<span class='comment'># detect version from generator
</span> <span class='id identifier rubyid_version'>version</span> <span class='op'>=</span> <span class='id identifier rubyid_wordpress_version_helper'>wordpress_version_helper</span><span class='lparen'>(</span><span class='id identifier rubyid_normalize_uri'>normalize_uri</span><span class='lparen'>(</span><span class='id identifier rubyid_target_uri'>target_uri</span><span class='period'>.</span><span class='id identifier rubyid_path'>path</span><span class='rparen'>)</span><span class='comma'>,</span> <span class='tstring'><span class='regexp_beg'>/</span><span class='tstring_content'>&lt;meta name=&quot;generator&quot; content=&quot;WordPress </span><span class='embexpr_beg'>#{</span><span class='const'><span class='object_link'><a href="#WORDPRESS_VERSION_PATTERN-constant" title="Msf::Exploit::Remote::HTTP::Wordpress::Version::WORDPRESS_VERSION_PATTERN (constant)">WORDPRESS_VERSION_PATTERN</a></span></span><span class='embexpr_end'>}</span><span class='tstring_content'>&quot; \/&gt;</span><span class='regexp_end'>/i</span></span><span class='rparen'>)</span>
<span class='kw'>return</span> <span class='id identifier rubyid_version'>version</span> <span class='kw'>if</span> <span class='id identifier rubyid_version'>version</span>
<span class='comment'># detect version from readme
</span> <span class='id identifier rubyid_version'>version</span> <span class='op'>=</span> <span class='id identifier rubyid_wordpress_version_helper'>wordpress_version_helper</span><span class='lparen'>(</span><span class='id identifier rubyid_wordpress_url_readme'>wordpress_url_readme</span><span class='comma'>,</span> <span class='tstring'><span class='regexp_beg'>/</span><span class='tstring_content'>&lt;br \/&gt;\sversion </span><span class='embexpr_beg'>#{</span><span class='const'><span class='object_link'><a href="#WORDPRESS_VERSION_PATTERN-constant" title="Msf::Exploit::Remote::HTTP::Wordpress::Version::WORDPRESS_VERSION_PATTERN (constant)">WORDPRESS_VERSION_PATTERN</a></span></span><span class='embexpr_end'>}</span><span class='regexp_end'>/i</span></span><span class='rparen'>)</span>
<span class='kw'>return</span> <span class='id identifier rubyid_version'>version</span> <span class='kw'>if</span> <span class='id identifier rubyid_version'>version</span>
<span class='comment'># detect version from rss
</span> <span class='id identifier rubyid_version'>version</span> <span class='op'>=</span> <span class='id identifier rubyid_wordpress_version_helper'>wordpress_version_helper</span><span class='lparen'>(</span><span class='id identifier rubyid_wordpress_url_rss'>wordpress_url_rss</span><span class='comma'>,</span> <span class='tstring'><span class='regexp_beg'>/</span><span class='tstring_content'>&lt;generator&gt;http:\/\/wordpress.org\/\?v=</span><span class='embexpr_beg'>#{</span><span class='const'><span class='object_link'><a href="#WORDPRESS_VERSION_PATTERN-constant" title="Msf::Exploit::Remote::HTTP::Wordpress::Version::WORDPRESS_VERSION_PATTERN (constant)">WORDPRESS_VERSION_PATTERN</a></span></span><span class='embexpr_end'>}</span><span class='tstring_content'>&lt;\/generator&gt;</span><span class='regexp_end'>/i</span></span><span class='rparen'>)</span>
<span class='kw'>return</span> <span class='id identifier rubyid_version'>version</span> <span class='kw'>if</span> <span class='id identifier rubyid_version'>version</span>
<span class='comment'># detect version from rdf
</span> <span class='id identifier rubyid_version'>version</span> <span class='op'>=</span> <span class='id identifier rubyid_wordpress_version_helper'>wordpress_version_helper</span><span class='lparen'>(</span><span class='id identifier rubyid_wordpress_url_rdf'>wordpress_url_rdf</span><span class='comma'>,</span> <span class='tstring'><span class='regexp_beg'>/</span><span class='tstring_content'>&lt;admin:generatorAgent rdf:resource=&quot;http:\/\/wordpress.org\/\?v=</span><span class='embexpr_beg'>#{</span><span class='const'><span class='object_link'><a href="#WORDPRESS_VERSION_PATTERN-constant" title="Msf::Exploit::Remote::HTTP::Wordpress::Version::WORDPRESS_VERSION_PATTERN (constant)">WORDPRESS_VERSION_PATTERN</a></span></span><span class='embexpr_end'>}</span><span class='tstring_content'>&quot; \/&gt;</span><span class='regexp_end'>/i</span></span><span class='rparen'>)</span>
<span class='kw'>return</span> <span class='id identifier rubyid_version'>version</span> <span class='kw'>if</span> <span class='id identifier rubyid_version'>version</span>
<span class='comment'># detect version from atom
</span> <span class='id identifier rubyid_version'>version</span> <span class='op'>=</span> <span class='id identifier rubyid_wordpress_version_helper'>wordpress_version_helper</span><span class='lparen'>(</span><span class='id identifier rubyid_wordpress_url_atom'>wordpress_url_atom</span><span class='comma'>,</span> <span class='tstring'><span class='regexp_beg'>/</span><span class='tstring_content'>&lt;generator uri=&quot;http:\/\/wordpress.org\/&quot; version=&quot;</span><span class='embexpr_beg'>#{</span><span class='const'><span class='object_link'><a href="#WORDPRESS_VERSION_PATTERN-constant" title="Msf::Exploit::Remote::HTTP::Wordpress::Version::WORDPRESS_VERSION_PATTERN (constant)">WORDPRESS_VERSION_PATTERN</a></span></span><span class='embexpr_end'>}</span><span class='tstring_content'>&quot;&gt;WordPress&lt;\/generator&gt;</span><span class='regexp_end'>/i</span></span><span class='rparen'>)</span>
<span class='kw'>return</span> <span class='id identifier rubyid_version'>version</span> <span class='kw'>if</span> <span class='id identifier rubyid_version'>version</span>
<span class='comment'># detect version from sitemap
</span> <span class='id identifier rubyid_version'>version</span> <span class='op'>=</span> <span class='id identifier rubyid_wordpress_version_helper'>wordpress_version_helper</span><span class='lparen'>(</span><span class='id identifier rubyid_wordpress_url_sitemap'>wordpress_url_sitemap</span><span class='comma'>,</span> <span class='tstring'><span class='regexp_beg'>/</span><span class='tstring_content'>generator=&quot;wordpress\/</span><span class='embexpr_beg'>#{</span><span class='const'><span class='object_link'><a href="#WORDPRESS_VERSION_PATTERN-constant" title="Msf::Exploit::Remote::HTTP::Wordpress::Version::WORDPRESS_VERSION_PATTERN (constant)">WORDPRESS_VERSION_PATTERN</a></span></span><span class='embexpr_end'>}</span><span class='tstring_content'>&quot;</span><span class='regexp_end'>/i</span></span><span class='rparen'>)</span>
<span class='kw'>return</span> <span class='id identifier rubyid_version'>version</span> <span class='kw'>if</span> <span class='id identifier rubyid_version'>version</span>
<span class='comment'># detect version from opml
</span> <span class='id identifier rubyid_version'>version</span> <span class='op'>=</span> <span class='id identifier rubyid_wordpress_version_helper'>wordpress_version_helper</span><span class='lparen'>(</span><span class='id identifier rubyid_wordpress_url_opml'>wordpress_url_opml</span><span class='comma'>,</span> <span class='tstring'><span class='regexp_beg'>/</span><span class='tstring_content'>generator=&quot;wordpress\/</span><span class='embexpr_beg'>#{</span><span class='const'><span class='object_link'><a href="#WORDPRESS_VERSION_PATTERN-constant" title="Msf::Exploit::Remote::HTTP::Wordpress::Version::WORDPRESS_VERSION_PATTERN (constant)">WORDPRESS_VERSION_PATTERN</a></span></span><span class='embexpr_end'>}</span><span class='tstring_content'>&quot;</span><span class='regexp_end'>/i</span></span><span class='rparen'>)</span>
<span class='kw'>return</span> <span class='id identifier rubyid_version'>version</span> <span class='kw'>if</span> <span class='id identifier rubyid_version'>version</span>
<span class='kw'>nil</span>
<span class='kw'>end</span></pre>
</td>
</tr>
</table>
</div>
</div>
</div>
<div id="footer">
Generated on Fri May 8 17:02:35 2026 by
<a href="https://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.37 (ruby-3.1.5).
</div>
</div>
</body>
</html>