Skip to content

Commit afdad8e

Browse files
authored
chore(wp_tatsu_rce): msftidy_docs fix
1 parent a67c883 commit afdad8e

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

documentation/modules/exploit/multi/http/wp_tatsu_rce.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
## Vulnerable Application
22

3-
This module exploits unauthenticated remote code execution in Tatsu plugin for Wordpress. The vulnerable version is below 3.3.11.
4-
The module upload malicious zip file containing PHP payload, which gets parsed and unzipped into Wordpress upload directory.
5-
Then module will trigger the payload by sending request with payload directory as URI. The vulnerable plugin is available [here](https://tatsubuilder.com/wp-content/uploads/edd/2022/03/tatsu-3.3.11.zip)
6-
3+
This module exploits unauthenticated remote code execution in Tatsu plugin for Wordpress. The vulnerable version is below 3.3.11.
4+
The module upload malicious zip file containing PHP payload, which gets parsed and unzipped into Wordpress upload directory.
5+
Then module will trigger the payload by sending request with payload directory as URI.
6+
The vulnerable plugin is available [here](https://tatsubuilder.com/wp-content/uploads/edd/2022/03/tatsu-3.3.11.zip)
77

88
## Verification Steps
99

0 commit comments

Comments
 (0)