File tree Expand file tree Collapse file tree 1 file changed +6
-5
lines changed
modules/exploits/unix/webapp Expand file tree Collapse file tree 1 file changed +6
-5
lines changed Original file line number Diff line number Diff line change 6
6
require 'msf/core'
7
7
8
8
class Metasploit3 < Msf ::Exploit ::Remote
9
+
9
10
Rank = ExcellentRanking
10
11
11
12
include Msf ::HTTP ::Wordpress
12
13
include Msf ::Exploit ::FileDropper
13
14
14
15
def initialize ( info = { } )
15
16
super ( update_info ( info ,
16
- 'Name' => 'Wordpress RevSlider File Upload and Execute Vulnerability' ,
17
+ 'Name' => 'WordPress RevSlider File Upload and Execute Vulnerability' ,
17
18
'Description' => %q{
18
19
This module exploits an arbitrary PHP code upload in the WordPress ThemePunch
19
- Revolution Slider ( revslider ) plugin, version 3.0.95 and prior. The
20
+ Slider Revolution (RevSlider ) plugin, versions 3.0.95 and prior. The
20
21
vulnerability allows for arbitrary file upload and remote code execution.
21
22
} ,
22
23
'Author' =>
@@ -27,10 +28,10 @@ def initialize(info = {})
27
28
'License' => MSF_LICENSE ,
28
29
'References' =>
29
30
[
30
- [ 'URL ' , 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/ ' ] ,
31
+ [ 'OSVDB ' , '115118 ' ] ,
31
32
[ 'EDB' , '35385' ] ,
32
33
[ 'WPVDB' , '7954' ] ,
33
- [ 'OSVDB ' , '115118 ' ]
34
+ [ 'URL ' , 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/ ' ]
34
35
] ,
35
36
'Privileged' => false ,
36
37
'Platform' => 'php' ,
@@ -91,6 +92,6 @@ def exploit
91
92
else
92
93
fail_with ( Failure ::Unknown , 'ERROR' )
93
94
end
94
-
95
95
end
96
+
96
97
end
You can’t perform that action at this time.
0 commit comments