Update description
parent
573e880a62
commit
b816dd569c
|
@ -19,10 +19,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
This module exploits a PHP Code Injection vulnerability on the W3 Total Cache
|
This module exploits a PHP Code Injection vulnerability on the W3 Total Cache
|
||||||
wordpress plugin up to and including 0.9.2.8 version. The exploit is due to the
|
wordpress plugin up to and including 0.9.2.8 version. The exploit is due to the
|
||||||
handle of some special macros, such as mfunc, which allow to inject arbitrary PHP
|
handle of some special macros, such as mfunc, which allow to inject arbitrary PHP
|
||||||
code. A valid post id where publish the malicious comment must be provided. Also
|
code. A valid post id where publish the malicious comment is needed. The user can
|
||||||
credentials if anonymous comments are allowed. Finally, comments shouldn't be
|
provide it with the POSTID option, otherwise a valid one will try to be brute
|
||||||
moderated in order finish the exploitation successfully. This module has been tested
|
forced. Also, if anonymous comments aren't allowed, valid credentials must be
|
||||||
against Wordpress 3.5 and W3 Total Cache 0.9.2.3 on a Ubuntu 10.04 system.
|
provided. Finally, comments shouldn't be moderated in order finish the exploitation
|
||||||
|
successfully. This module has been tested against Wordpress 3.5 and W3 Total Cache
|
||||||
|
0.9.2.3 on a Ubuntu 10.04 system.
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
|
Loading…
Reference in New Issue