module

WordPress Backup Migration Plugin PHP Filter Chain RCE

Disclosed
Dec 11, 2023
Created
Jan 17, 2024

Description

This module exploits an unauth RCE in the WordPress plugin: Backup Migration ( exploitable through the Content-Dir header which is sent to the /wp-content/plugins/backup-backup/includes/backup-heart.php endpoint.

The exploit makes use of a neat technique called PHP Filter Chaining which allows an attacker to prepend
bytes to a string by continuously chaining character encoding conversions. This allows an attacker to prepend
a PHP payload to a string which gets evaluated by a require statement, which results in command execution.

Authors

Nex Team
Valentin Lobstein
jheysel-r7

Platform

Linux,PHP,Unix,Windows

Architectures

php, cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/http/wp_backup_migration_php_filter
msf exploit(wp_backup_migration_php_filter) > show targets
...targets...
msf exploit(wp_backup_migration_php_filter) > set TARGET < target-id >
msf exploit(wp_backup_migration_php_filter) > show options
...show and set options...
msf exploit(wp_backup_migration_php_filter) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.