Skip to content

Commit f121a64

Browse files
committed
+1 professionalism :)
1 parent face944 commit f121a64

File tree

1 file changed

+12
-4
lines changed

1 file changed

+12
-4
lines changed

documentation/modules/auxiliary/scanner/http/wordpress_content_injection.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,27 @@
11
**Feature description:**
22

3-
This adds a module for the WordPress 4.7/4.7.1
3+
This adds a module for the WordPress [4.7](https://wordpress.org/wordpress-4.7.tar.gz)/[4.7.1](https://wordpress.org/wordpress-4.7.1.tar.gz)
44
content injection vulnerability detailed at
55
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html.
66

77
**Verification steps:**
88

99
- [ ] Download https://wordpress.org/wordpress-4.7.1.tar.gz
1010
- [ ] `tar xf wordpress-4.7.1.tar.gz -C /var/www/html --no-same-owner`
11-
- [ ] Ensure the install dir is not writable by the web user (prevents autoupdating)
12-
- [ ] Install the sucker
11+
- [ ] Prevent auto-update with either:
12+
1. [ ] Ensure the install dir is not writable by the web user
13+
2. [ ] Add the following to `wp_config.php` (after install)
14+
```
15+
define( 'WP_AUTO_UPDATE_CORE', false );
16+
define( 'AUTOMATIC_UPDATER_DISABLED', true );
17+
```
18+
- [ ] Install Wordpress
19+
- [ ] Start `msfconsole`
20+
- [ ] `use auxiliary/scanner/http/wordpress_content_injection`
21+
- [ ] Set `rhost`, `rport` and `TARGETURI`
1322
- [ ] Set `ACTION` to either `LIST` or `UPDATE`
1423
- [ ] Set `POST_ID` and `POST_TITLE`, `POST_CONTENT`, and/or `POST_PASSWORD`
1524
- [ ] Run the module
16-
- [ ] ~~Add your defacement to Zone-H~~ jk
1725
1826
**Sample run:**
1927

0 commit comments

Comments
 (0)