module
WordPress Backup Migration Plugin PHP Filter Chain RCE
Disclosed | Created |
---|---|
Dec 11, 2023 | Jan 17, 2024 |
Disclosed
Dec 11, 2023
Created
Jan 17, 2024
Description
This module exploits an unauth RCE in the WordPress plugin: Backup Migration ( exploitable through the Content-Dir header which is sent to the /wp-content/plugins/backup-backup/includes/backup-heart.php endpoint.
The exploit makes use of a neat technique called PHP Filter Chaining which allows an attacker to prepend
bytes to a string by continuously chaining character encoding conversions. This allows an attacker to prepend
a PHP payload to a string which gets evaluated by a require statement, which results in command execution.
The exploit makes use of a neat technique called PHP Filter Chaining which allows an attacker to prepend
bytes to a string by continuously chaining character encoding conversions. This allows an attacker to prepend
a PHP payload to a string which gets evaluated by a require statement, which results in command execution.
Authors
Nex Team
Valentin Lobstein
jheysel-r7
Valentin Lobstein
jheysel-r7
Platform
Linux,PHP,Unix,Windows
Architectures
php, cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.