Wordpress NextGEN Gallery plugin Cross-Site Scripting Vulnerability

2013.01.07
Credit: Am!r
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

############################# # # Exploit Title : Wordpress NextGEN Gallery plugin Cross-Site Scripting Vulnerability # # Author : IrIsT.Ir # # Discovered By : Am!r # # Home : http://IrIsT.Ir/forum/ # # Software Link : http://wordpress.org/extend/plugins/nextgen-gallery/ # # Security Risk : High # # Version : All Version # # Tested on : GNU/Linux Ubuntu - Windows Server - win7 # # Dork : inurl:plugins/nextgen-gallery # ############################# # # Expl0iTs : # # [Target]/wp-content/plugins/nextgen-gallery/nggallery.php?test-head=[Xss] # # # C0de : # # if ( isset( $_GET['test-head'] ) ) # # add_action( 'wp_head', create_function('', 'echo \'<!--wp_head-->\';'), 99999 ); # # ############################# # # Greats : B3HZ4D - Mikili - Dead.Zone - C0dex - TaK.FaNaR - BestC0d3r - Beni_Vanda - one hacker alone # # 0x0ptim0us - m3hdi - F@rid - dr.tofan - skote_vahshat - Mr.Xpr - M.R.S.CO - Mr.Cicili - Dj.TiniVini # # Alireza - H-SK33PY - Immortal Boy - Noter - & All Members In Www.IrIsT.Ir/forum & Www.Datacoders.Org # #############################

References:

http://wordpress.org/extend/plugins/nextgen-gallery/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top