来源:自学PHP网 时间:2015-04-17 13:03 作者: 阅读:次
[导读] 标题: WordPress Front End Upload v0.5.4.4 Arbitrary PHP File Upload Vulnerability作者: Chris Kellum主页: http://mondaybynoon.com/软件地址: http://downloads.wordpress.org/plugin/front......
标题: WordPress Front End Upload v0.5.4.4 Arbitrary PHP File Upload Vulnerability
作者: Chris Kellum 主页: http://mondaybynoon.com/ 软件地址: http://downloads.wordpress.org/plugin/front-end-upload.0.5.4.4.zip 影响版本: 0.5.4.4 缺陷分析 ===================== Plugin does not properly filter filetypes, which allows for the upload of filetypes in the following format: filename.php.jpg Vulnerable hosts will serve such files as a php file, allowing for malicious files to be uploaded and executed. In creating the uploads folder for this plugin, the code utilizes uniqid to add a unique string to the upload folder name in order to better hide it from direct access. Example: www.2cto.com /wp-content/uploads/feu_9fc12558ac71e6995808cfc590207e87/ However, many WordPress installations allow direct access to the /wp-content/uploads/ folder, so simply look for a folder name beginning with 'feu_' to locate your upload. |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com