Skip to content

Commit 55152da

Browse files
Merge pull request #21186 from Devansh7006/add-wordpress-pingback-doc
Add documentation for wordpress_pingback_access module
2 parents 71d4faa + b9666f5 commit 55152da

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
## Vulnerable Application
2+
3+
This module checks for accessible WordPress pingback functionality.
4+
5+
Pingback is an XML-RPC feature in WordPress that allows blogs to notify each other of references.
6+
If enabled, it can be abused for:
7+
8+
- DDoS amplification attacks
9+
- Internal network scanning
10+
- Information disclosure
11+
12+
To test this module:
13+
14+
1. Set up a WordPress instance (any version with XML-RPC enabled)
15+
2. Ensure `/xmlrpc.php` is accessible
16+
3. Pingback functionality should not be disabled
17+
18+
## Verification Steps
19+
20+
1. Start Metasploit: `msfconsole`
21+
2. Load the module: `use auxiliary/scanner/http/wordpress_pingback_access`
22+
3. Set the target: `set RHOSTS example.com`
23+
4. Run the module: `run`
24+
25+
If vulnerable, the module will indicate that pingback access is enabled.
26+
27+
## Options
28+
29+
This module has no additional options beyond the standard ones.
30+
31+
## Scenarios
32+
33+
Example usage against a WordPress site with pingback enabled:
34+
```bash
35+
msf > use auxiliary/scanner/http/wordpress_pingback_access
36+
msf auxiliary(scanner/http/wordpress_pingback_access) > set RHOSTS example.com
37+
RHOSTS => example.com
38+
msf auxiliary(scanner/http/wordpress_pingback_access) > run
39+
[*] Checking pingback access on example.com
40+
[+] Pingback is enabled and accessible at /xmlrpc.php
41+
[*] Scanned 1 of 1 hosts (100% complete)
42+
[*] Auxiliary module execution completed
43+
msf auxiliary(scanner/http/wordpress_pingback_access) >
44+
```

0 commit comments

Comments
 (0)