|
2 | 2 |
|
3 | 3 | module Msf::HTTP::Wordpress::Version
|
4 | 4 |
|
| 5 | + # Used to check if the version is correct: must contain at least one dot |
| 6 | + WORDPRESS_VERSION_PATTERN = '([^\r\n"\']+\.[^\r\n"\']+)' |
| 7 | + |
5 | 8 | # Extracts the Wordpress version information from various sources
|
6 | 9 | #
|
7 | 10 | # @return [String,nil] Wordpress version if found, nil otherwise
|
8 | 11 | def wordpress_version
|
9 | 12 | # detect version from generator
|
10 |
| - version = wordpress_version_helper(normalize_uri(target_uri.path), /<meta name="generator" content="WordPress #{wordpress_version_pattern}" \/>/i) |
| 13 | + version = wordpress_version_helper(normalize_uri(target_uri.path), /<meta name="generator" content="WordPress #{WORDPRESS_VERSION_PATTERN}" \/>/i) |
11 | 14 | return version if version
|
12 | 15 |
|
13 | 16 | # detect version from readme
|
14 |
| - version = wordpress_version_helper(wordpress_url_readme, /<br \/>\sversion #{wordpress_version_pattern}/i) |
| 17 | + version = wordpress_version_helper(wordpress_url_readme, /<br \/>\sversion #{WORDPRESS_VERSION_PATTERN}/i) |
15 | 18 | return version if version
|
16 | 19 |
|
17 | 20 | # detect version from rss
|
18 |
| - version = wordpress_version_helper(wordpress_url_rss, /<generator>http:\/\/wordpress.org\/\?v=#{wordpress_version_pattern}<\/generator>/i) |
| 21 | + version = wordpress_version_helper(wordpress_url_rss, /<generator>http:\/\/wordpress.org\/\?v=#{WORDPRESS_VERSION_PATTERN}<\/generator>/i) |
19 | 22 | return version if version
|
20 | 23 |
|
21 | 24 | # detect version from rdf
|
22 |
| - version = wordpress_version_helper(wordpress_url_rdf, /<admin:generatorAgent rdf:resource="http:\/\/wordpress.org\/\?v=#{wordpress_version_pattern}" \/>/i) |
| 25 | + version = wordpress_version_helper(wordpress_url_rdf, /<admin:generatorAgent rdf:resource="http:\/\/wordpress.org\/\?v=#{WORDPRESS_VERSION_PATTERN}" \/>/i) |
23 | 26 | return version if version
|
24 | 27 |
|
25 | 28 | # detect version from atom
|
26 |
| - version = wordpress_version_helper(wordpress_url_atom, /<generator uri="http:\/\/wordpress.org\/" version="#{wordpress_version_pattern}">WordPress<\/generator>/i) |
| 29 | + version = wordpress_version_helper(wordpress_url_atom, /<generator uri="http:\/\/wordpress.org\/" version="#{WORDPRESS_VERSION_PATTERN}">WordPress<\/generator>/i) |
27 | 30 | return version if version
|
28 | 31 |
|
29 | 32 | # detect version from sitemap
|
30 |
| - version = wordpress_version_helper(wordpress_url_sitemap, /generator="wordpress\/#{wordpress_version_pattern}"/i) |
| 33 | + version = wordpress_version_helper(wordpress_url_sitemap, /generator="wordpress\/#{WORDPRESS_VERSION_PATTERN}"/i) |
31 | 34 | return version if version
|
32 | 35 |
|
33 | 36 | # detect version from opml
|
34 |
| - version = wordpress_version_helper(wordpress_url_opml, /generator="wordpress\/#{wordpress_version_pattern}"/i) |
| 37 | + version = wordpress_version_helper(wordpress_url_opml, /generator="wordpress\/#{WORDPRESS_VERSION_PATTERN}"/i) |
35 | 38 | return version if version
|
36 | 39 |
|
37 | 40 | nil
|
38 | 41 | end
|
39 | 42 |
|
40 |
| - private |
| 43 | + # Checks a readme for a vulnerable version |
| 44 | + # |
| 45 | + # @param [String] plugin_name The name of the plugin |
| 46 | + # @param [String] fixed_version The version the vulnerability was fixed in |
| 47 | + # @param [String] vuln_introduced_version Optional, the version the vulnerability was introduced |
| 48 | + # |
| 49 | + # @return [ Msf::Exploit::CheckCode ] |
| 50 | + def check_plugin_version_from_readme(plugin_name, fixed_version, vuln_introduced_version = nil) |
| 51 | + check_version_from_readme(:plugin, plugin_name, fixed_version, vuln_introduced_version) |
| 52 | + end |
41 | 53 |
|
42 |
| - # Used to check if the version is correct: must contain at least one dot. |
| 54 | + # Checks a readme for a vulnerable version |
43 | 55 | #
|
44 |
| - # @return [ String ] |
45 |
| - def wordpress_version_pattern |
46 |
| - '([^\r\n"\']+\.[^\r\n"\']+)' |
| 56 | + # @param [String] theme_name The name of the theme |
| 57 | + # @param [String] fixed_version The version the vulnerability was fixed in |
| 58 | + # @param [String] vuln_introduced_version Optional, the version the vulnerability was introduced |
| 59 | + # |
| 60 | + # @return [ Msf::Exploit::CheckCode ] |
| 61 | + def check_theme_version_from_readme(theme_name, fixed_version, vuln_introduced_version = nil) |
| 62 | + check_version_from_readme(:theme, theme_name, fixed_version, vuln_introduced_version) |
47 | 63 | end
|
48 | 64 |
|
| 65 | + private |
| 66 | + |
49 | 67 | def wordpress_version_helper(url, regex)
|
50 |
| - res = send_request_cgi({ |
51 |
| - 'method' => 'GET', |
52 |
| - 'uri' => url |
53 |
| - }) |
| 68 | + res = send_request_cgi( |
| 69 | + 'method' => 'GET', |
| 70 | + 'uri' => url |
| 71 | + ) |
54 | 72 | if res
|
55 | 73 | match = res.body.match(regex)
|
56 |
| - if match |
57 |
| - return match[1] |
58 |
| - end |
| 74 | + return match[1] if match |
59 | 75 | end
|
60 | 76 |
|
61 | 77 | nil
|
62 | 78 | end
|
63 | 79 |
|
| 80 | + def check_version_from_readme(type, name, fixed_version, vuln_introduced_version = nil) |
| 81 | + case type |
| 82 | + when :plugin |
| 83 | + folder = 'plugins' |
| 84 | + when :theme |
| 85 | + folder = 'themes' |
| 86 | + else |
| 87 | + fail("Unknown readme type #{type}") |
| 88 | + end |
| 89 | + |
| 90 | + readme_url = normalize_uri(target_uri.path, wp_content_dir, folder, name, 'readme.txt') |
| 91 | + res = send_request_cgi( |
| 92 | + 'uri' => readme_url, |
| 93 | + 'method' => 'GET' |
| 94 | + ) |
| 95 | + # no readme.txt present |
| 96 | + return Msf::Exploit::CheckCode::Unknown if res.nil? || res.code != 200 |
| 97 | + |
| 98 | + # try to extract version from readme |
| 99 | + # Example line: |
| 100 | + # Stable tag: 2.6.6 |
| 101 | + version = res.body.to_s[/stable tag: ([^\r\n"\']+\.[^\r\n"\']+)/i, 1] |
| 102 | + |
| 103 | + # readme present, but no version number |
| 104 | + return Msf::Exploit::CheckCode::Detected if version.nil? |
| 105 | + |
| 106 | + vprint_status("#{peer} - Found version #{version} of the #{type}") |
| 107 | + |
| 108 | + # Version older than fixed version |
| 109 | + if Gem::Version.new(version) < Gem::Version.new(fixed_version) |
| 110 | + if vuln_introduced_version.nil? |
| 111 | + # All versions are vulnerable |
| 112 | + return Msf::Exploit::CheckCode::Appears |
| 113 | + # vuln_introduced_version provided, check if version is newer |
| 114 | + elsif Gem::Version.new(version) >= Gem::Version.new(vuln_introduced_version) |
| 115 | + return Msf::Exploit::CheckCode::Appears |
| 116 | + else |
| 117 | + # Not in range, nut vulnerable |
| 118 | + return Msf::Exploit::CheckCode::Safe |
| 119 | + end |
| 120 | + # version newer than fixed version |
| 121 | + else |
| 122 | + return Msf::Exploit::CheckCode::Safe |
| 123 | + end |
| 124 | + end |
64 | 125 | end
|
0 commit comments