
13 changes to exploits/shellcodes/ghdb Saflok - Key Derication Function Exploit (shellcode) Linux-x64 - create a shell with execve() sending argument using XOR (/bin//sh) [55 bytes] Academy LMS 6.2 - Reflected XSS Blood Bank v1.0 - Multiple SQL Injection Moodle 4.3 - Reflected XSS TASKHUB-2.8.8 - XSS-Reflected WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - _Dashboard Redirect_ field Stored Cross-Site Scripting (XSS) WP Fastest Cache 1.2.2 - Unauthenticated SQL Injection WP Rocket < 2.10.3 - Local File Inclusion (LFI)
22 lines
No EOL
910 B
Text
22 lines
No EOL
910 B
Text
# Exploit Title: WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - "Dashboard Redirect" field Stored Cross-Site Scripting (XSS)
|
||
# Google Dork: NA
|
||
# Date: 28/10/2023
|
||
# Exploit Author: Rachit Arora
|
||
# Vendor Homepage:
|
||
# Software Link: https://wordpress.org/plugins/admin-bar-dashboard-control/
|
||
# Version: 1.2.8
|
||
# Category: Web Application
|
||
# Tested on: Windows
|
||
# CVE : 2023-47184
|
||
|
||
|
||
1. Install WordPress (latest)
|
||
|
||
2. Install and activate Admin Bar & Dashboard Access Control.
|
||
|
||
3. Navigate to "Admin Bar & Dash" >> Under Dashboard Access and in the "Dashboard Redirect" enter the payload into the input field.
|
||
|
||
"onfocusin=alert``+autofocus>
|
||
"onfocusin=alert`document.domain`+autofocus>
|
||
|
||
4. You will observe that the payload successfully got stored and when you are triggering the same functionality in that time JavaScript payload is executing successfully and we are getting a pop-up. |