This exploit requires Metasploit to have a FQDN and the ability to run a payload web server on port 80, 443, or 8080. The FQDN must also not resolve to a reserved address (192/172/127/10). The server must also respond to a HEAD request for the payload, prior to getting a GET request. This exploit leverages an authenticated improper input validation in WordPress plugin Popular Posts versions 5.3.2 and below. The exploit chain is rather complicated. Authentication is required and gd for PHP is required on the server. Then the Popular Post plugin is reconfigured to allow for an arbitrary URL for the post image in the widget. A post is made, then requests are sent to the post to make it more popular than the previous #1 by 5. Once the post hits the top 5, and after a 60 second server cache refresh (the exploit waits 90 seconds), the homepage widget is loaded which triggers the plugin to download the payload from the server. The payload has a GIF header, and a double extension (.gif.php) allowing for arbitrary PHP code to be executed.
90db5fa8de8fdf34a913230d5320fbeba171c2aac53e75371d7b3d5919bde065
Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.
bd64674b9152057bf1534ca7d7aab8cad4fccb1027813e0d0281f48823a82475
Red Hat Security Advisory 2021-5206-02 - Log4j is a tool to help the programmer output log statements to a variety of output targets. Issues addressed include a code execution vulnerability.
9d0b55c3698901f73309bbaf111059dc96c503f7e8b4b5f10dfdc03732f2263c
Ubuntu Security Notice 5203-1 - Hideki Okamoto and Guy Lederfein discovered that Apache Log4j 2 did not protect against infinite recursion in lookup evaluation. A remote attacker could possibly use this issue to cause Apache Log4j 2 to crash, leading to a denial of service.
2509fd996d8268bfd9a66c77ed06d9c68d807866fb92dc62b89d8410889526ab
VMware Security Advisory 2021-0030 - VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities.
bd5d7dc27d7142729d7b0b3eef7723aa7a5d955f9dbaf105237d210af165583e
VMware Security Advisory 2021-0028.4 - VMware has released a response to the Apache Log4j remote code execution vulnerability. They have updated this advisory.
957e29f898225bb7fd6b5e005b5fc7f5f33240b94a7b9f29556d699b70f105a7
Bazaar Web PHP Social Listings suffers from a remote shell upload vulnerability.
f1629de60b9c1c66f85917fe4e27cf490f6caab55d5182d2047cf1df6cde10ab
This is a brief write up discussing insecure functions susceptible to classic buffer overflows.
6c56ef6f21fb5c517c4f05fbff6461b2f130d800355ad39593d8b2f06bee3943
Video Sharing Website version 1.0 appears to suffer from a remote SQL injection vulnerability.
2784313c95a531246f7199e48b5fedc0ea6d5e52978a87d8aae64cb4c78d0d35
Signup PHP Portal version 2.1 suffers from a remote shell upload vulnerability.
0ffc78db1554cc2312874b940b014bebbe2e06854b885e74b9060727a2e56e98
Alfa Team Shell Tesla version 4.1 suffers from a remote code execution vulnerability.
363374659febefa3f6d3f2659c5f5631aa41a3d73f84debd925e4dccbd81a349