Deface POC WP Ghost Theme [LiveTarget] via Uploadify
⚠️ Disclaimer: This article is intended solely for educational purposes. The creator shall not be held liable for any misuse, illegal activities, or damages resulting from the unauthorized use of this content.
Apa Itu WP Ghost Theme Vulnerability?
Ghost Theme di WordPress memiliki kelemahan di file upload_settings_image.php
yang menggunakan library Uploadify.
Bug ini memungkinkan file upload tanpa filter, sehingga attacker bisa mengunggah script deface atau bahkan shell backdoor.
Alat yang Dibutuhkan
- 💻 Komputer atau HP
- 🌐 Koneksi internet
- 📝 Script deface (.txt , .jpg .png .gif .htm.html)
- 🐚 Shell backdoor (opsional)
Dork Google untuk Cari Target
inurl:wp-content/themes/Ghost/ inurl:wp-content/themes/Ghost/includes/ inurl:wp-content/themes/Ghost/includes/uploadify/ inurl:wp-content/themes/Ghost/includes/uploadify/upl oad_settings_image.php
exploit(endpoint)
wp-content/themes/Ghost/includes/uploadify/upload_settings_image.php
Cari target menggunakan Google dork di atas. Fokus ke hasil dengan path upload_settings_image.php
.
Ciri-ciri Target Vulnerable
Saat target rentan diakses, biasanya akan muncul respon JSON seperti ini:
{"status":"NOK", "ERR":"This file is incorect"}
👉 Kalau muncul pesan di atas, artinya endpoint aktif dan bisa dicoba exploit. Kalau 404 / error beda, kemungkinan sudah dipatch.
Live Target Contoh
Contoh target yang menggunakan Ghost Theme:
https://www.esthetiquejulie.be/wp-content/themes/Ghost/includes/uploadify/upload_settings_image.php
Langkah Eksploitasi Uploadify (PoC)
Step by Step
- Buka tool CSRF online: https://tools.prinsh.com/home/?tools=csrf
- Isi kolom URL dengan link exploit (contoh:
/upload_settings_image.php
) - Pada Post File, masukkan:
filedata
- Upload file deface / shell favoritmu (misal:
sclu.html
) - Klik Lock dan jalankan request
Kenapa bisa berhasil? Karena script upload ini tidak memfilter ekstensi file dan tidak mengecek MIME-type.
Cara Akses File yang Sudah Diupload
Lokasi file hasil upload biasanya di folder:
/wp-content/uploads/settingsimages/
Contoh akses SC:
https://target.com/wp-content/uploads/settingsimages/sclu.html
"Where creativity, exploitation, and expression collide." — 6ickZone
Posting Komentar