WordPress W3 Total Cache PHP Code Execution
This module exploits a PHP Code Injection vulnerability against WordPress plugin W3 Total Cache for versions up to and including 0.9.2.8. WP Super Cache 1.2 or older is also reported as vulnerable. The vulnerability is due to the handling of certain macros such as mfunc, which allows arbitrary PHP code injection. A valid post ID is needed in order to add the malicious comment. If the POSTID option isn't specified, then the module will automatically find or bruteforce one. Also, if anonymous comments aren't allowed, then a valid username and password must be provided. In addition, the "A comment is held for moderation" option on WordPress must be unchecked for successful exploitation. This module has been tested against WordPress 3.5 and W3 Total Cache 0.9.2.3 on a Ubuntu 10.04 system.
- juan vazquez <juan.vazquez [at] metasploit.com>
- hdm <x [at] hdm.io>
- Christian Mehlmauer <FireFart [at] gmail.com>
- Wordpress 3.5
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/unix/webapp/wp_total_cache_exec msf exploit(wp_total_cache_exec) > show targets ...targets... msf exploit(wp_total_cache_exec) > set TARGET <target-id> msf exploit(wp_total_cache_exec) > show options ...show and set options... msf exploit(wp_total_cache_exec) > exploit