Vulnerability & Exploit Database

Back to search

WordPress WP Mobile Detector 3.5 Shell Upload

WP Mobile Detector Plugin for WordPress contains a flaw that allows a remote attacker to execute arbitrary PHP code. This flaw exists because the /wp-content/plugins/wp-mobile-detector/resize.php script does contains a remote file include for files not cached by the system already. By uploading a .php file, the remote system will place the file in a user-accessible path. Making a direct request to the uploaded file will allow the attacker to execute the script with the privileges of the web server.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/unix/webapp/wp_mobile_detector_upload_execute

Authors

  • pluginvulnerabilities.com
  • Aaditya Purani
  • h00die

References

Targets

  • wp-mobile-detectory < 3.6

Platforms

  • php

Architectures

  • php

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/unix/webapp/wp_mobile_detector_upload_execute msf exploit(wp_mobile_detector_upload_execute) > show targets ...targets... msf exploit(wp_mobile_detector_upload_execute) > set TARGET <target-id> msf exploit(wp_mobile_detector_upload_execute) > show options ...show and set options... msf exploit(wp_mobile_detector_upload_execute) > exploit