module

WordPress Crop-image Shell Upload

Disclosed
2019-02-19
Created
2019-04-22

Description

This module exploits a path traversal and a local file inclusion
vulnerability on WordPress versions 5.0.0 and
The crop-image function allows a user, with at least author privileges,
to resize an image and perform a path traversal by changing the _wp_attached_file
reference during the upload. The second part of the exploit will include
this image in the current theme by changing the _wp_page_template attribute
when creating a post.

This exploit module only works for Unix-based systems currently.

Authors

RIPSTECH Technology
Wilfried Becard wilfried.becard@synacktiv.com

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/wp_crop_rce
msf exploit(wp_crop_rce) > show targets
...targets...
msf exploit(wp_crop_rce) > set TARGET < target-id >
msf exploit(wp_crop_rce) > show options
...show and set options...
msf exploit(wp_crop_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.