# Exploit Title: RSS News AutoPilot Script 1.0.1 / 3.0.3 - CSRF to Persistent XSS and RCE Through Unrestricted File Upload # Date: 30 August 2016 # Exploit Author: Arbin Godar # Website : ArbinGodar.com # Software Link: https://codecanyon.net/item/rss-news-autopilot-script/11812898 # Version: 1.0.1 to 3.0.3 ---------------------------------------------------------------------------------------------------------------------- RSS News AutoPilot Script File: http://www.mediafire.com/file/6dmegm8ak1jv2u1/rss.zip Description: An Attackers are able to execute js and php code on web application using RSS News - AutoPilot Script which allow an attacker to create a post when an authenticated user/admin browses a special crafted web page. Also, all the process was possible without any authenticated user/admin for more info watch the below PoC Video. The title parameter was not filtering special characters mean vulnerable to XSS and while uploading image they weren't filtering the file type mean vulnerable to unrestricted file upload. So, now by creating CSRF exploit code for posting an article with XSS alert JS payload as title of post and php file as a image. Now if the attacker is able to perform CSRF attack sucessfully then XSS will be triggered and we can execute php code too. PoC Video: https://youtu.be/znDgv8K0yFk CSRF Exploit Code: [RSS News - AutoPilot Script] CSRF to Persistent XSS and RCE


[RSS News - AutoPilot Script] CSRF to Persistent XSS and RCE

Vendor Shouted Urgent Update: http://wpsup.com/products/rss-news-script/urgent-update-fix-security-bugs/ Fix/Patch: Update to latest version. ---------------------------------------------------------------------------------------------------------------------- Regards, Arbin Godar https://twitter.com/arbingodar