################################################################################################################################### # Exploit Title: Wordpress ThinkIT plugin - CSRF / XSS # Date: 2013 15 August # Exploit Author: Yashar shahinzadeh # Special thanks to Mormoroth # Credit goes for: http://y-shahinzadeh.ir & ha.cker.ir # Vendor Homepage: http://thinkoverit.com/ # Tested on: Linux & Windows, PHP 5.2.9 # Affected Version : 0.1 # # Contacts: { http://Twitter.com/YShahinzadeh , http://y-shahinzadeh.ir , http://Twitter.com/Mormoroth , http://mormoroth.ir } ################################################################################################################################### Summary: ======== 1. CSRF - Delete a form 2. Cross site scripting 1. CSRF - Delete a form: ======================== Contact form ID can be easily understood from HTML page source, , which [ID] is the form ID, following crafted exploit may be used so as to delete form completely: Obviously, ID must be replaced. 2. Cross site scripting: ======================== http://[WP]/wordpress/wp-admin/admin.php?toitcf_current_id=[XSS]&page=toitcf /** Yasshar shahinzadeh **/