Skip to content

Commit 57343d3

Browse files
Chocapikkjvoisin
andauthored
Update modules/exploits/multi/http/wp_givewp_rce.rb
Co-authored-by: Julien Voisin <[email protected]>
1 parent 06a9583 commit 57343d3

File tree

1 file changed

+1
-6
lines changed

1 file changed

+1
-6
lines changed

modules/exploits/multi/http/wp_givewp_rce.rb

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,7 @@ def initialize(info = {})
1616
info,
1717
'Name' => 'GiveWP Unauthenticated Donation Process Exploit',
1818
'Description' => %q{
19-
The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to a PHP Object Injection (POI) attack.
20-
This vulnerability exists in all versions up to and including 3.14.1 due to improper handling of untrusted input in the 'give_title' parameter.
21-
The flaw allows unauthenticated attackers to inject a PHP object via the deserialization of this parameter.
22-
Exploiting this vulnerability can lead to arbitrary code execution, as the PHP Object Injection is leveraged to trigger a chain of property-oriented programming (POP) that facilitates remote code execution (RCE).
23-
Additionally, the attacker may gain the ability to delete arbitrary files on the affected server.
24-
This module interacts with the vulnerable endpoint by exploiting this weakness to execute arbitrary code on the server, potentially leading to full server compromise.
19+
The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress in all versions up to and including 3.14.1 is vulnerable to a PHP Object Injection (POI) attack granting an unauthenticated arbitrary code execution.
2520
},
2621

2722
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)