#Exploit Title: AllWebMenus WordPress Menu Plugin Arbitrary file upload #Version: < 1.1.9 #Date: 2012-01-19 #Author: 6Scan (http://6scan.com) security team #Software Link: http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/ #Official fix: This advisory is released after the vendor was contacted and fixed the issue promptly. #Description: Unauthorized users could upload arbitrary files to the vulnerable server, potentially executing commands AllWebMenus WordPress Menu Plugin <1.1.8 Remote File upload On versions < 1.1.8 , lack of checks in script actions.php allowed malicious user to upload any file to the vulnerable server. Create a file (For example, Wordpress_security.php , with this content ) Compress it with zip to awm.zip Use this form to upload the php file to the server
Version 1.1.8 also checks the source referrer, so you have to use scripting language (or spoof it in another way) to set the HTTP_REFERER to "wp-admin/options-general.php?page=allwebmenus-wordpress-menu-plugin/allwebmenus-wordpress-menu.php"