Hacked REDBUS WordPress plugin and able to perform Cross-site Scripting Vulnerability….

Amit Kumar Biswas @Amitlt2
2 min readApr 20, 2022

Hello, Hackers Welcome back to another writeup where I have shared a scenario of WP_plugin being vulnerable to Cross-site Scripting Vulnerability.

Description: Cross-site scripting (XSS) vulnerability in index.php in the WP-FaceThumb plugin 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pagination_wp_facethumb parameter.

The Affected Path:- /?page_id=1&pagination_wp_facethumb=1

Affected Parameter: pagination_wp_facethumb=1

I just search each and every parameter like this

And after some time I understand that this Wp_plugin 1.0 is Vulnerable to an XSS but not able to know the payload… after some time I discovered a Target that is already vulnerable and someone had already infected the XSS payload into that web application…

After clicking on this Url I saw this Url I discovered the payload: <%2Fscript><script>alert%28document.domain%29<%2Fscript>

Finally, I run this payload into that parameter and it was executed

/?page_id=1&pagination_wp_facethumb=1<%2Fscript><script>alert%28document.domain%29<%2Fscript>

I report it Ethically…

Again I fired up my sexiest tools subfinder with httpx and paramspider…

Discovered one more XSS where Wp Frontend Uploader plugin 0.9.2 is Vulnerable…

Description: Cross-site scripting (XSS) vulnerability in the Frontend Uploader plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the errors[fu-disallowed-mime-type][0][name] parameter to the default URI.

&&errors[fu-disallowed-mime-type][0][name]=

This arbitary name parameter is vulnerable

&&errors[fu-disallowed-mime-type][0][name]=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E

Reported it to the security team of Redbus: security@redbus.in

Happy to Secure Redbus…

  1. REDBUS XSS YT VIDEO: https://youtu.be/tPjBOQYNRug
  2. REDBUS XSS YT VIDEO: https://youtu.be/24N5MXQmJw4

Thanks for taking the time to read my write-up and share it with your friends, Like & Follow for more updates.

Follow me:

Instagram

Twitter

Facebook

LinkedIn

--

--

Amit Kumar Biswas @Amitlt2

Cyber Security Analyst at @avalanceGlobalSolutions | Security Researcher in | Cyber Security Researcher in Microsoft & Bugcrowd | R&D in Smart Contract |