Skip to content

Commit 8493a73

Browse files
committed
Add module doc to appease the @h00die god
Straight rip of the PR description, yo.
1 parent 0644200 commit 8493a73

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
**Feature description:**
2+
3+
This adds a module for the WordPress 4.7/4.7.1
4+
content injection vulnerability detailed at
5+
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html.
6+
7+
**Verification steps:**
8+
9+
- [ ] Download https://wordpress.org/wordpress-4.7.1.tar.gz
10+
- [ ] `tar xf wordpress-4.7.1.tar.gz -C /var/www/html --no-same-owner`
11+
- [ ] Ensure the install dir is not writable by the web user (prevents autoupdating)
12+
- [ ] Install the sucker
13+
- [ ] Set `ACTION` to either `LIST` or `UPDATE`
14+
- [ ] Set `POST_ID` and `POST_TITLE`, `POST_CONTENT`, and/or `POST_PASSWORD`
15+
- [ ] Run the module
16+
- [ ] ~~Add your defacement to Zone-H~~ jk
17+
18+
**Sample run:**
19+
20+
This is just the `LIST` action...
21+
22+
```
23+
msf auxiliary(wordpress_content_injection) > run
24+
25+
[*] REST API found in HTML document
26+
Posts at https://[redacted]:443/ (REST API: /wp-json/wp/v2)
27+
============================================================
28+
29+
ID Title URL Status Password
30+
-- ----- --- ------ --------
31+
1 Hello world! https://[redacted]/2016/10/hello-world/ Published No
32+
87 Hello world! https://[redacted]/2016/08/hello-world-2/ Published No
33+
34+
[*] Scanned 1 of 1 hosts (100% complete)
35+
[*] Auxiliary module execution completed
36+
msf auxiliary(wordpress_content_injection) >
37+
```

0 commit comments

Comments
 (0)