Home / os / blackberry
Wordpress Easyrotator Plugin File Manipulation Vulnerability
Posted on 30 November -0001
<HTML><HEAD><TITLE>Wordpress Easyrotator Plugin File Manipulation Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Exploit Title : Wordpress Easyrotator Plugin File Manipulation Vulnerability Exploit Author : 0x3a Credit : Iran Cyber Security Group Date : 8 May 2016 Version : 1.0.13 Vendor Home Page : www.wordpress.org/plugins/easyrotator-for-wordpress/ Download Link : www.downloads.wordpress.org/plugin/easyrotator-for-wordpress.1.0.13.zip Tested On : Windows 10 , Mozillad FireFox Category : Web Application Dork : inurl:/wp-content/plugins/easyrotator-for-wordpress |~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Vulnerable File : [+]/engine/main.php Vulnerable Function : [+]processuploadedzip() Velneable Code : (Line 2104) [+]if (<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="f1d0b19c9e8794">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>_uploaded_file($_FILES['Filedata']['tmp_name'], $tempZipLocation)) Picture : s6.picofile.com/file/8250521092/Easyrotator.PNG |~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Greetz To : MOHAMAD-NOFOZI , root3r , Sir.H4m1d And All Members OF Iran Cyber Security Group (WWW.IRAN-CYBER.NET) Contact Us : Telegram : @Haji_Was_Here Yahoo : haj.0x3a </BODY></HTML>