Update description

unstable
jvazquez-r7 2013-04-24 17:34:25 -05:00
parent 573e880a62
commit b816dd569c
1 changed files with 6 additions and 4 deletions

View File

@ -19,10 +19,12 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a PHP Code Injection vulnerability on the W3 Total Cache This module exploits a PHP Code Injection vulnerability on the W3 Total Cache
wordpress plugin up to and including 0.9.2.8 version. The exploit is due to the wordpress plugin up to and including 0.9.2.8 version. The exploit is due to the
handle of some special macros, such as mfunc, which allow to inject arbitrary PHP handle of some special macros, such as mfunc, which allow to inject arbitrary PHP
code. A valid post id where publish the malicious comment must be provided. Also code. A valid post id where publish the malicious comment is needed. The user can
credentials if anonymous comments are allowed. Finally, comments shouldn't be provide it with the POSTID option, otherwise a valid one will try to be brute
moderated in order finish the exploitation successfully. This module has been tested forced. Also, if anonymous comments aren't allowed, valid credentials must be
against Wordpress 3.5 and W3 Total Cache 0.9.2.3 on a Ubuntu 10.04 system. provided. Finally, comments shouldn't be moderated in order finish the exploitation
successfully. This module has been tested against Wordpress 3.5 and W3 Total Cache
0.9.2.3 on a Ubuntu 10.04 system.
}, },
'Author' => 'Author' =>
[ [