module

PHP XML-RPC Arbitrary Code Execution

Disclosed
06/29/2005
Created
05/30/2018

Description

This module exploits an arbitrary code execution flaw
discovered in many implementations of the PHP XML-RPC module.
This flaw is exploitable through a number of PHP web
applications, including but not limited to Drupal, Wordpress,
Postnuke, and TikiWiki.

Authors

hdm cazz

Platform

Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

    msf > use exploit/unix/webapp/php_xmlrpc_eval
    msf /(l) > show actions
        ...actions...
    msf /(l) > set ACTION < action-name >
    msf /(l) > show options
        ...show and set options...
    msf /(l) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.