module
WordPress Traversal Directory DoS
Disclosed | Created |
---|---|
01/01/1970 | 05/30/2018 |
Disclosed
01/01/1970
Created
05/30/2018
Description
Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin
function in wp-admin/includes/ajax-actions.php in WordPress before 4.6
allows remote attackers to hijack the authentication of subscribers
for /dev/random read operations by leveraging a late call to
the check_ajax_referer function, a related issue to CVE-2016-6896.
function in wp-admin/includes/ajax-actions.php in WordPress before 4.6
allows remote attackers to hijack the authentication of subscribers
for /dev/random read operations by leveraging a late call to
the check_ajax_referer function, a related issue to CVE-2016-6896.
Authors
Yorick KosterCryptisStudents
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use auxiliary/dos/http/wordpress_directory_traversal_dos msf /(s) > show actions ...actions... msf /(s) > set ACTION < action-name > msf /(s) > show options ...show and set options... msf /(s) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.