• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

Woocommerce Custom Tshirt Desginer CSRF Shell Upload Vulnerability

November 15, 2013 by Jack Wilder 2 Comments

Oke, kali ini saya mau share exploit yang baru ditemukan kemarin yaitu Woocommerce Custom Tshirt Desginer CSRF Shell Upload Vulnerability. caranya cukup mudah kok. Langsung saja ikuti tutorialnya :
Bahan-bahan :

HTML Exploiter Download Disini | save dengan format .html

Vulnerability :
[localhost]/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/upload.php
Dork :
use your brain bitch :p
Shell Location :
[localhost]/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/uploadImage/[randomname].php

Langkah-langkah :
Oke, langsung saja nyelem ke google nyari target vuln. :p
Contoh target saya adalah http://mbrinformatique.com/
Ubah url nya menjadi
http://mbrinformatique.com/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/upload.php
Jika error, berarti vuln 😀

Langkah kedua, buka HTML Exploiter diatas dan edit bagian http://127.0.0.1/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/upload.php dengan web yang vuln.
save kembali lalu buka lewat browser. :p

nah tuh, upload shell nya lewat situ. maka kalo sudah sukses kalian akan mendapatkan nama acak. Misal :
1384522165528621b5f41fe.php

maka letak shell kalian ada di

  • [localhost]/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/uploadImage/[randomname].php

Contoh :

  • http://mbrinformatique.com/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/uploadImage/1384522165528621b5f41fe.php

Kalo sudah seperti ituya terserah mau diapain -_-

Thanks to founder of this exploit :

Bebyyers404 | JKT48 CYBER TEAM – Black Devil Crew

Sekian tutorial kali ini semoga bermanfaat 🙂

Shares

Filed Under: WordPress Exploit Tagged With: Exploit

Reader Interactions

Comments

  1. cak oni says

    November 17, 2013 at 2:28 am

    keren kang 😀

    Reply
  2. Hafiz Sec says

    November 18, 2013 at 11:28 pm

    Psang link saya gan. http://indonesian-hackerlink.blogspot.com/ . link agan sudah saya pasang, silakan cek http://indonesian-hackerlink.blogspot.com/2013/11/link-friends_17.html

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

Deface WordPress Dengan Exploit Archin WordPress Theme 3.2 Unauthenticated Configuration Access Vulnerability

Exploit WordPress Plugin WP Mobile Edition Local File Disclosure Vulnerability

Cara Deface dengan Exploit Slims CMS Senayan Arbitrary File Upload Vulnerability

Upload Backdoor Lewat MySQL Database (phpMyAdmin)

Tool Deface Opencart Bruteforce and Upload Image

Cracking FTP Password using Hydra on BackBox Linux

Deface WordPress dengan Exploit WordPress TheLoft Theme Arbitrary File Download Vulnerability

Prestashop Module Blocktestimonial File Upload Auto Exploit

Arti dari Kata Deface yang Sering Dibahas oleh para Hacker

Exploit WordPress Ajax Load More PHP Upload Vulnerability

Powered by WordPress and Genesis Framework. Style by LinuxSec.