21 lines
No EOL
852 B
Text
21 lines
No EOL
852 B
Text
# Exploit Title: WordPress Plugin Smart Slider-3 3.5.0.8 - 'name' Stored Cross-Site Scripting (XSS)
|
|
# Exploit Author: Hardik Solanki
|
|
# Date: 05/06/2021
|
|
# Software Link: https://wordpress.org/plugins/smart-slider-3/
|
|
# Version: 3.5.0.8
|
|
# Tested on Windows
|
|
|
|
*How to reproduce vulnerability:*
|
|
|
|
1. Install WordPress 5.7.2
|
|
2. Install and activate the "*Smart Slider 3" Version 3.5.0.8* plugin
|
|
3. Navigate to "*Dashboard* and create a "*New Project*".
|
|
4. Enter the JavaScript payload "*<script>alert(document.cookie)</script>*" into the "*Name*" field.
|
|
5. You will observe that the Project has been created with malicious
|
|
JavaScript payload "<script>alert(document.cookie)</script>" and hence
|
|
project has been* created/stored* and thus JavaScript payload is executing
|
|
successfully.
|
|
|
|
*XSS IMPACT:*
|
|
1: Steal the cookie
|
|
2: User redirection to a malicious website |