1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

Parse error. not well formed #13

Closed borekon closed 7 years ago

borekon commented 7 years ago

Traying the script with my blog shows an error (i uncommented the second print content). The fellowing is the full error:

<?xml version="1.0" encoding="UTF-8"?>
<methodResponse>
  <fault>
    <value>
      <struct>
        <member>
          <name>faultCode</name>
          <value><int>-32700</int></value>
        </member>
        <member>
          <name>faultString</name>
          <value><string>parse error. not well formed</string></value>
        </member>
      </struct>
    </value>
  </fault>
</methodResponse>
1N3 commented 7 years ago

This could be due to an update in Wordpress. Newer versions of wordpress may not support this functionality out of the box. Outside of this, not sure what the issue is.