< ------------------- header data start ------------------- >

#############################################################

# Application Name : Wordpress

# Vulnerable Type : XSRF

# Google Keyword : inurl:wp-content, inurl:admin, powered by wordpress

# Infection : Uzaktan otomatik olarak admin eklenebilir, mevcut admin account ile login olunabilir.

# Bug Fix Advice : Form’a Oturum Key’i (Session Token) eklenmeli, eski sifre sorulmalidir.

# author : Bug Researchers/Aras,Samet.

#############################################################

< ------------------- header data end of ------------------- >


< -- bug code start -- >

Exploit Download: http://www.bug-res.com/xsrfexploit.txt

Exploit code 2 : http://www.bug-res.com/xsrfexploit1.txt

With Clickjacking : http://www.bug-res.com/cj.rar

< -- bug code end of -- >