Add note about PHPMailer being bundled
parent
35670713ff
commit
2055bf8f65
|
@ -1,7 +1,8 @@
|
||||||
## Intro
|
## Intro
|
||||||
|
|
||||||
This vuln has some caveats: you need approximately WordPress 4.6 with
|
This vuln has some caveats: you need approximately WordPress 4.6 with
|
||||||
Exim for the `sendmail(8)` command.
|
Exim for the `sendmail(8)` command. You do not need to install
|
||||||
|
PHPMailer, as it is included as part of the WordPress install.
|
||||||
|
|
||||||
Thanks to WP's awesome practice of backporting the heck out of all their
|
Thanks to WP's awesome practice of backporting the heck out of all their
|
||||||
patches, we need to use a Git clone and check out the vuln release.
|
patches, we need to use a Git clone and check out the vuln release.
|
||||||
|
|
|
@ -15,7 +15,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
'Name' => 'WordPress PHPMailer Host Header Command Injection',
|
'Name' => 'WordPress PHPMailer Host Header Command Injection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a command injection vulnerability in WordPress
|
This module exploits a command injection vulnerability in WordPress
|
||||||
version 4.6 with Exim as an MTA via a spoofed Host header to PHPMailer.
|
version 4.6 with Exim as an MTA via a spoofed Host header to PHPMailer,
|
||||||
|
a mail-sending library that is bundled with WordPress.
|
||||||
|
|
||||||
A valid WordPress username is required to exploit the vulnerability.
|
A valid WordPress username is required to exploit the vulnerability.
|
||||||
Additionally, due to the altered Host header, exploitation is limited to
|
Additionally, due to the altered Host header, exploitation is limited to
|
||||||
|
|
Loading…
Reference in New Issue