[wp-hackers] WordPress <= 2.8.5 Unrestricted File Upload Arbitrary PHP Code Execution

Chris Jean gaarai at gaarai.com
Thu Nov 12 17:11:37 UTC 2009

I've just caught wind of this issue. Can I get more details on how to 
attempt the exploit? For example, if there is a file: exploit.php.jpg, 
do I simply request that file via the browser or is there a trick to it?

Chris Jean

Otto wrote:
> I just confirmed on my friend's vulnerable host that this code in the
> .htaccess removed the vulnerability.
> RemoveHandler application/x-httpd-php .php
> <FilesMatch "\.php$|\.php5$|\.php4$|\.php3$|\.phtml$|\.phpt$">
>    SetHandler application/x-httpd-php
> </FilesMatch>
> <FilesMatch "\.phps$">
>   SetHandler application/x-httpd-php-source
> </FilesMatch>
> -Otto
> Sent from Memphis, TN, United States
> _______________________________________________
> wp-hackers mailing list
> wp-hackers at lists.automattic.com
> http://lists.automattic.com/mailman/listinfo/wp-hackers

More information about the wp-hackers mailing list