Home / exploitsPDF  

WordPress Simple File List Unauthenticated Remote Code Execution

Posted on 25 November 2020

This Metasploit module exploits WordPress Simple File List plugin versions prior to 4.2.3, which allows remote unauthenticated attackers to upload files within a controlled list of extensions. However, the rename function does not conform to the file extension restrictions, thus allowing arbitrary PHP code to be uploaded first as a png then renamed to php and executed.

 

TOP