[wp-hackers] WordPress <= 2.8.5 Unrestricted File Upload Arbitrary PHP Code Execution
Aaron D. Campbell
aaron at xavisys.com
Wed Nov 11 19:33:14 UTC 2009
I haven't been able to duplicate this on any of my servers either. I
did find that different browsers display my "vuln-test.php.jpg" differently.
Firefox shows the path to the file such as
IE 8 shows the contents of the file such as "<?php phpinfo(); ?>"
Opera and Safari both show it like a broken image
> To do that, you would just want test.php to output a image/jpeg mim
> header, followed by the jpeg binary data. No need for tricky clever
> naming tricks.
> I've been unable to get this to work on my local Apache install so
> far. test.php.jpg doesn't execute. Does anybody know the config needed
> to make this vulnerable?
> Sent from Memphis, TN, United States
More information about the wp-hackers