, u+ w& P# H- h( l$ W作者 => Zikou-16+ U. B; m$ [( B B* H
邮箱 => zikou16x@gmail.com 3 v5 M. G9 @; i& j E/ Y测试系统 : Windows 7 , Backtrack 5r31 l9 f3 q) Z h* t1 Y* B, |& @
下载地址 : http://xmlswf.com/images/stories/WP_plugins/wp-catpro.zip7 a Z0 U' j' z# b/ Y
#### . C" t! L1 `, c1 d% ~8 T ( Z5 x5 H5 ~9 ?7 T3 j#=> Exploit 信息: ! J. S W# f; y2 l* l7 R------------------ . x3 v: ~/ R2 x: `3 [0 E6 H# 攻击者可以上传 file/shell.php.gif C0 p q0 V, L' I% x- O: Y5 w4 V
# ("jpg", "gif", "png") // Allowed file extensions . y8 a: V# ^5 W7 @) S# "/uploads/"; // The path were we will save the file (getcwd() may not be reliable and should be tested in your environment) % V" f$ z ?; w# '.A-Z0-9_ !@#$%^&()+={}\[\]\',~`-'; // Characters allowed in the file name (in a Regular Expression format)( [& d& k" Y1 ]# B8 T/ D
------------------7 V5 Q5 P4 y* V