File tree Expand file tree Collapse file tree 1 file changed +37
-0
lines changed
documentation/modules/auxiliary/scanner/http Expand file tree Collapse file tree 1 file changed +37
-0
lines changed Original file line number Diff line number Diff line change
1
+ **Feature description :**
2
+
3
+ This adds a module for the WordPress 4.7 /4.7 . 1
4
+ content injection vulnerability detailed at
5
+ https :/ /blog . sucuri . net /2017 /02 /content -injection -vulnerability -wordpress -rest -api . html .
6
+
7
+ **Verification steps :**
8
+
9
+ - [ ] Download https :/ /wordpress . org /wordpress -4.7 . 1 . tar . gz
10
+ - [ ] `tar xf wordpress-4.7.1.tar.gz -C /var/www/html --no-same-owner`
11
+ - [ ] Ensure the install dir is not writable by the web user ( prevents autoupdating )
12
+ - [ ] Install the sucker
13
+ - [ ] Set `ACTION` to either `LIST` or `UPDATE`
14
+ - [ ] Set `POST_ID` and `POST_TITLE` , `POST_CONTENT` , and /or `POST_PASSWORD`
15
+ - [ ] Run the module
16
+ - [ ] ~~Add your defacement to Zone -H ~~ jk
17
+
18
+ **Sample run :**
19
+
20
+ This is just the `LIST` action ...
21
+
22
+ `` `
23
+ msf auxiliary(wordpress_content_injection) > run
24
+
25
+ [*] REST API found in HTML document
26
+ Posts at https://[redacted]:443/ (REST API: /wp-json/wp/v2)
27
+ ============================================================
28
+
29
+ ID Title URL Status Password
30
+ -- ----- --- ------ --------
31
+ 1 Hello world! https://[redacted]/2016/10/hello-world/ Published No
32
+ 87 Hello world! https://[redacted]/2016/08/hello-world-2/ Published No
33
+
34
+ [*] Scanned 1 of 1 hosts (100% complete)
35
+ [*] Auxiliary module execution completed
36
+ msf auxiliary(wordpress_content_injection) >
37
+ ` ``
You can’t perform that action at this time.
0 commit comments