# Exploit Title: WordPress Responsive Thumbnail Slider Arbitrary File Upload# Date: 2015/8/29# Exploit Author: Arash Khazaei# Vendor Homepage:
Thumbnail carousel slider
# Software Link:
https://downloads.wordpress.org/plugin/wp-responsive-thumbnail-slider.zip# Version: 1.0# Tested on: Kali , Iceweasel Browser# CVE : N/A# Contact : http://twitter.com/0xClay# Email : 0xclay@gmail.com# Site : http://bhunter.ir# Intrduction :# WordPress Responsive Thumbnail Slider Plugin iS A With 6000+ Active
Install
# And Suffer From A File Upload Vulnerability Allow Attacker Upload Shell
As A Image .# Authors , Editors And Of Course Administrators This Vulnerability To Harm
WebSite .# POC :# For Exploiting This Vulnerability :# Go To Add Image Section And Upload File By Self Plugin Uploader# Then Upload File With Double Extension Image# And By Using A BurpSuite Or Tamper Data Change The File Name From
Shell.php.jpg To Shell.php
# And Shell Is Uploaded . :)<!-- Discovered By Arash Khazaei (Aka JunkyBoy)-->