WordPress WP Mobile Detector 3.5 Shell Upload
WP Mobile Detector Plugin for WordPress contains a flaw that allows a remote attacker to execute arbitrary PHP code. This flaw exists because the /wp-content/plugins/wp-mobile-detector/resize.php script does contains a remote file include for files not cached by the system already. By uploading a .php file, the remote system will place the file in a user-accessible path. Making a direct request to the uploaded file will allow the attacker to execute the script with the privileges of the web server.
- Aaditya Purani
- wp-mobile-detectory < 3.6
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/unix/webapp/wp_mobile_detector_upload_execute msf exploit(wp_mobile_detector_upload_execute) > show targets ...targets... msf exploit(wp_mobile_detector_upload_execute) > set TARGET <target-id> msf exploit(wp_mobile_detector_upload_execute) > show options ...show and set options... msf exploit(wp_mobile_detector_upload_execute) > exploit