Files
beef/modules/misc/wordpress_post_auth_rce/config.yaml
2024-12-25 12:43:13 +10:00

16 lines
795 B
YAML

#
# Copyright (c) 2006-2025 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - https://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
wordpress_post_auth_rce:
enable: true
category: "Misc"
name: "Wordpress Post-Auth RCE"
description: "This module attempts to upload and activate a malicious wordpress plugin. Afterwards, the URI to trigger it is: http://vulnerable-wordpress.site/wordpress/wp-content/plugins/beefbind/beefbind.php. The command to execute can be send by a POST-parameter named 'cmd'. CORS headers have been added to allow bidirectional crossorigin communication."
authors: ["Bart Leppens"]
target:
working: ["ALL"]