漏洞版本:
WordPress OptimizePress Plugin 1.x
漏洞描述:
WordPress是一种使用PHP语言开发的博客平台,用户可以在支持PHP和MySQL数据库的服务器上架设自己的网志。 '/wp-content/themes/OptimizePress/lib/admin/media-upload.php'不正确校验用户提交的上传文件扩展,允许远程攻击者利用漏洞提交恶意文件,并以WEB权限执行。
<* 参考
http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability*>
http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update
http://sebug.net/appdir/WordPress
测试方法:
本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
- #############################################################################
- # Exploit Title: WordPress OptimizePress Themes File Upload Vulnerability #
- # Author: Eagle Eye #
- # Date: 21/11/2013 #
- # Themes Link: http://www.optimizepress.com/ #
- # Infected File: lib/admin/media-upload.php #
- # Category: webapps #
- # Google dork: inurl:/wp-content/themes/OptimizePress/ #
- # inurl:/wp-content/uploads/optpress/ #
- # Tested on : Windows/Linux #
- #############################################################################
- # #
- #Exploit #
- # #
- #- Upload your shell #
- # #
- #http://127.0.0.1/wp-content/themes/OptimizePress/lib/admin/media-upload.php#
- # #
- #- Your shell is here #
- # #
- #http://127.0.0.1/wp-content/uploads/optpress/images_comingsoon/ #
- # #
- #.:: United of Muslim Cyber Army ::. #
- # #
- #############################################################################
安全建议:
厂商补丁: WordPress ----- WordPress OptimizePress Plugin 1.6已经修复该漏洞,请到厂商的主页下载: http://help.optimizepress.com