Skip to content

Commit

Permalink
Updated metadata
Browse files Browse the repository at this point in the history
  • Loading branch information
jheysel-r7 committed Dec 20, 2023
1 parent e3062d4 commit eeb74cd
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 4 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
## Vulnerable Application

This module exploits an unauth RCE in the WordPress plugin: Backup Migration (<= 1.3.7). The vulnerability is
exploitable through the Content-Dir header which is sent to the /includes/backup-heart.php endpoint.
exploitable through the Content-Dir header which is sent to the /wp-content/plugins/backup-backup/includes/backup-heart.php endpoint.

The vuln makes use of a neat technique called PHP Filter Chaining which allows an attacker to prepend
bytes to a string by continuously chaining character encoding conversion. This allows an attacker to prepend
Expand Down
5 changes: 2 additions & 3 deletions modules/exploits/multi/http/wp_backup_migration_php_filter.rb
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,8 @@ def initialize(info = {})
info,
'Name' => 'WordPress Backup Migration Plugin PHP Filter Chain RCE',
'Description' => %q{
Exploit for an unauthenticated remote code execution vulnerability in the WordPress plugin: Backup Migration (<= 1.3.7).
The vulnerability is exploitable through the Content-Dir header which is sent to the
/includes/backup-heart.php endpoint.
This module exploits an unauth RCE in the WordPress plugin: Backup Migration (<= 1.3.7). The vulnerability is
exploitable through the Content-Dir header which is sent to the /wp-content/plugins/backup-backup/includes/backup-heart.php endpoint.
The vuln makes use of a neat technique called PHP Filter Chaining which allows an attacker to prepend
bytes to a string by continuously chaining character encoding conversions. This allows an attacker to prepend
Expand Down

0 comments on commit eeb74cd

Please sign in to comment.