6
6
require 'msf/core'
7
7
8
8
class Metasploit3 < Msf ::Exploit ::Remote
9
+
9
10
Rank = ExcellentRanking
10
11
11
12
include Msf ::HTTP ::Wordpress
12
13
include Msf ::Exploit ::FileDropper
13
14
14
15
def initialize ( info = { } )
15
16
super ( update_info ( info ,
16
- 'Name' => 'Wordpress RevSlider File Upload and Execute Vulnerability' ,
17
+ 'Name' => 'WordPress RevSlider File Upload and Execute Vulnerability' ,
17
18
'Description' => %q{
18
19
This module exploits an arbitrary PHP code upload in the WordPress ThemePunch
19
- Revolution Slider ( revslider ) plugin, version 3.0.95 and prior. The
20
+ Slider Revolution (RevSlider ) plugin, versions 3.0.95 and prior. The
20
21
vulnerability allows for arbitrary file upload and remote code execution.
21
22
} ,
22
23
'Author' =>
@@ -27,16 +28,16 @@ def initialize(info = {})
27
28
'License' => MSF_LICENSE ,
28
29
'References' =>
29
30
[
30
- [ 'URL ' , 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/ ' ] ,
31
+ [ 'OSVDB ' , '115118 ' ] ,
31
32
[ 'EDB' , '35385' ] ,
32
33
[ 'WPVDB' , '7954' ] ,
33
- [ 'OSVDB ' , '115118 ' ]
34
+ [ 'URL ' , 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/ ' ]
34
35
] ,
35
36
'Privileged' => false ,
36
37
'Platform' => 'php' ,
37
38
'Arch' => ARCH_PHP ,
38
39
'Targets' => [ [ 'ThemePunch Revolution Slider (revslider) 3.0.95' , { } ] ] ,
39
- 'DisclosureDate' => 'Nov 26 2015 ' ,
40
+ 'DisclosureDate' => 'Nov 26 2014 ' ,
40
41
'DefaultTarget' => 0 )
41
42
)
42
43
end
@@ -91,6 +92,6 @@ def exploit
91
92
else
92
93
fail_with ( Failure ::Unknown , 'ERROR' )
93
94
end
94
-
95
95
end
96
+
96
97
end
0 commit comments