Skip to content

dhakalananda/wp-ssrf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WordPress SSRF Demo Playground

This is a repository that contains the vulnerable WordPress docker instance and the exploit script to play around and test with.

The full research article of this repo can be found here.

Installation

  1. git clone https://github.com/dhakalananda/wp-ssrf
  2. cd wp-ssrf
  3. docker compose up

The vulnerable wp_safe_remote_get() function is located at /wp-content/plugins/vulnerable-plugin/index.php. The url parameter takes in the user-input and passes it to the vulnerable function.

Prerequisite

In order to exploit this, a server with a very low TTL is needed.

Reference:

DNS Rebinding Tool

Live Tool

Running the Exploit

To exploit this docker instance, we need the Gateway IP of the container. It might be either 192.168.0.1 or 172.*.0.1.

However, on a real-world server with WordPress on port 80, and httpd on port 8080 and not exposed to the internet, 127.0.0.1 should work.

  1. Get a server that switches between an external IP and gateway IP
  2. python3 exploit.py -t http://TARGET -r http://REBIND_URL

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published