Vulnerability & Exploit Database

Back to search

WordPress XMLRPC GHOST Vulnerability Scanner

This module can be used to determine hosts vulnerable to the GHOST vulnerability via a call to the WordPress XMLRPC interface. If the target is vulnerable, the system will segfault and return a server error. On patched systems, a normal XMLRPC error is returned.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

auxiliary/scanner/http/wordpress_ghost_scanner

Authors

  • Robert Rowley
  • Christophe De La Fuente
  • Chaim Sanders
  • Felipe Costa
  • Jonathan Claudius
  • Karl Sigler
  • Christian Mehlmauer <FireFart [at] gmail.com>

References

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/http/wordpress_ghost_scanner msf auxiliary(wordpress_ghost_scanner) > show actions ...actions... msf auxiliary(wordpress_ghost_scanner) > set ACTION <action-name> msf auxiliary(wordpress_ghost_scanner) > show options ...show and set options... msf auxiliary(wordpress_ghost_scanner) > run

Related Vulnerabilities

Related Modules