User Controls

Hacking my website that uses Wordpress 4.5.3 and Nginx 1.4.1

  1. #1
    Misterigh Houston
    Both of these are out of date and I'm thinking about using CVE-2013-4547 as my initial point of entry. The only information I can find on this exploit is...

    https://github.com/vulhub/vulhub/tree/master/nginx/CVE-2013-4547

    Is this exploit only for uploading files or could I use it for reading files on the server as well?

    I'm not going to use any special tools for and want everything to written by myself.
  2. #2
    Sophie Pedophile Tech Support
    You could upload a shell, a shell allows you to read and write. But if your target is vulnerable to this exploit it will be vulnerable to an RCE as well most likely. See this dir

    https://github.com/vulhub/vulhub/tree/master/nginx/CVE-2013-4547/php-fpm

    It has a conf file right. Try to see if you can use the auth bypass to read the config file.

    Check it for the details described here.

    https://github.com/neex/phuip-fpizdam

    And while you're there you could always write your own variant of the tool available at that repo if you want to.
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. #3
    Robert Mugabe African Astronaut
    I wish I could understand what language you Nerds are talking.
  4. #4
    Sophie Pedophile Tech Support
    Originally posted by Robert Mugabe I wish I could understand what language you Nerds are talking.

    We're speaking cyborg.
    The following users say it would be alright if the author of this post didn't die in a fire!
Jump to Top