Skip to content

SurabayaBlackhat/AFDFDE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Arbitrary File Download & File Deletion Exploit

surabayablackhat

Details

The vulnerable file is located at http://localhost/wp-content/themes/{NAME-THEME}/lib/scripts/dl-skin.php In exploit code, file name in first text box should be readable on the vulnerable server, then the vulnerable code allows it to be downloaded from the server. And the second textbox accepts a directory path. If it is writeable then vulnerable code will delete its contents. An attacker can download readable files from the server and also can delete contents of writeable directories.

How to Use

  • Cukup membaca di setiap nama file/theme yang ada di repository Arbitrary File Download & File Deletion Exploit (AFDFDE).

Require

  • Browser (Google-Chrome/Chromium, Firefox, IE, etc browser)
  • Text Editor (Notepad/++, Dreamweaver, Sublimetext, etc editor)

Operating System

  • Windows
  • Mac
  • Linux

If: Use application with Ruby CLI (ruby-AFDFDE)

List of Theme

Lean to Be Better

About

Arbitrary File Download & File Deletion Exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published