• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

Woocommerce Custom Tshirt Desginer CSRF Shell Upload Vulnerability

November 15, 2013 by Jack Wilder 2 Comments

Oke, kali ini saya mau share exploit yang baru ditemukan kemarin yaitu Woocommerce Custom Tshirt Desginer CSRF Shell Upload Vulnerability. caranya cukup mudah kok. Langsung saja ikuti tutorialnya :
Bahan-bahan :

HTML Exploiter Download Disini | save dengan format .html

Vulnerability :
[localhost]/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/upload.php
Dork :
use your brain bitch :p
Shell Location :
[localhost]/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/uploadImage/[randomname].php

Langkah-langkah :
Oke, langsung saja nyelem ke google nyari target vuln. :p
Contoh target saya adalah http://mbrinformatique.com/
Ubah url nya menjadi
http://mbrinformatique.com/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/upload.php
Jika error, berarti vuln 😀

Langkah kedua, buka HTML Exploiter diatas dan edit bagian http://127.0.0.1/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/upload.php dengan web yang vuln.
save kembali lalu buka lewat browser. :p

nah tuh, upload shell nya lewat situ. maka kalo sudah sukses kalian akan mendapatkan nama acak. Misal :
1384522165528621b5f41fe.php

maka letak shell kalian ada di

  • [localhost]/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/uploadImage/[randomname].php

Contoh :

  • http://mbrinformatique.com/wp-content/plugins/woocommerce-custom-t-shirt-designer/includes/templates/template-black/designit/cs/uploadImage/1384522165528621b5f41fe.php

Kalo sudah seperti ituya terserah mau diapain -_-

Thanks to founder of this exploit :

Bebyyers404 | JKT48 CYBER TEAM – Black Devil Crew

Sekian tutorial kali ini semoga bermanfaat 🙂

Shares

Filed Under: WordPress Exploit Tagged With: Exploit

Reader Interactions

Comments

  1. cak oni says

    November 17, 2013 at 2:28 am

    keren kang 😀

    Reply
  2. Hafiz Sec says

    November 18, 2013 at 11:28 pm

    Psang link saya gan. http://indonesian-hackerlink.blogspot.com/ . link agan sudah saya pasang, silakan cek http://indonesian-hackerlink.blogspot.com/2013/11/link-friends_17.html

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

MyBB 1.8.x SQL Injection Auto Exploit

WordPress Army Knife CSRF File Upload Vulnerability

Deface WordPress dengan Exploit WordPress Plugins WPShop File Upload Vulnerability

Heroku Custom Domain or Subdomain Takeover

bWAPP Remote File Inclusion Medium Security Level

WordPress Plugin CopySafe PDF Protection Shell Upload

Exploit WordPress Ajax Load More PHP Upload Vulnerability

Cara Mudah Hack cPanel dengan Fitur Reset Password

FCKeditor Bypass Shell Upload With Burp Suite Intercept

DNS Hijacking through Social Engineering

LinuxSec / 88 queries in 0.35 seconds