< ------------------- header data start ------------------- >
#############################################################
# Application Name : Wordpress
# Vulnerable Type : XSRF
# Google Keyword : inurl:wp-content, inurl:admin, powered by wordpress
# Infection : Uzaktan otomatik olarak admin eklenebilir, mevcut admin account ile login olunabilir.
# Bug Fix Advice : Form’a Oturum Key’i (Session Token) eklenmeli, eski sifre sorulmalidir.
# author : Bug Researchers/Aras,Samet.
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
Exploit Download: http://www.bug-res.com/xsrfexploit.txt
Exploit code 2 : http://www.bug-res.com/xsrfexploit1.txt
With Clickjacking : http://www.bug-res.com/cj.rar
< -- bug code end of -- >