Hacked REDBUS WordPress plugin and able to perform Cross-site Scripting Vulnerability….
Hello, Hackers Welcome back to another writeup where I have shared a scenario of WP_plugin being vulnerable to Cross-site Scripting Vulnerability.
Description: Cross-site scripting (XSS) vulnerability in index.php in the WP-FaceThumb plugin 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pagination_wp_facethumb parameter.
The Affected Path:- /?page_id=1&pagination_wp_facethumb=1
Affected Parameter: pagination_wp_facethumb=1
I just search each and every parameter like this
And after some time I understand that this Wp_plugin 1.0 is Vulnerable to an XSS but not able to know the payload… after some time I discovered a Target that is already vulnerable and someone had already infected the XSS payload into that web application…
After clicking on this Url I saw this Url I discovered the payload: <%2Fscript><script>alert%28document.domain%29<%2Fscript>
Finally, I run this payload into that parameter and it was executed
/?page_id=1&pagination_wp_facethumb=1<%2Fscript><script>alert%28document.domain%29<%2Fscript>
I report it Ethically…
Again I fired up my sexiest tools subfinder with httpx and paramspider…
Discovered one more XSS where Wp Frontend Uploader plugin 0.9.2 is Vulnerable…
Description: Cross-site scripting (XSS) vulnerability in the Frontend Uploader plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the errors[fu-disallowed-mime-type][0][name] parameter to the default URI.
&&errors[fu-disallowed-mime-type][0][name]=
This arbitary name parameter is vulnerable
&&errors[fu-disallowed-mime-type][0][name]=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E
Reported it to the security team of Redbus: security@redbus.in
Happy to Secure Redbus…
- REDBUS XSS YT VIDEO: https://youtu.be/tPjBOQYNRug
- REDBUS XSS YT VIDEO: https://youtu.be/24N5MXQmJw4
Thanks for taking the time to read my write-up and share it with your friends, Like & Follow for more updates.
Follow me: