WordPress WPtouch 4.3.47 Open Redirection

WordPress WPtouch Pro plugin version 4.3.47 suffers from an open redirection vulnerability.


SHA-256 | 2b22cd5b90c911802d927abb54c8119d2b1dc591e16daaed28465dc11975c231

====================================================================================================================================
| # Title : WordPress - WPtouch 4.3.47 Open Redirect Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0(64-bit) |
| # Vendor : https://wordpress.org/plugins/wptouch/ |
| # Dork : wp-content/plugins/wptouch/ |
====================================================================================================================================

P0C :

== Description ==

WPtouch is a mobile plugin for WordPress that automatically adds a simple and elegant mobile theme for mobile visitors to your WordPress website.
When you activate the plugin and set it up, it allows the site visitor to view it according to the device used for browsing
However, when connected to a mobile device, Plugins allows you to switch the display between a desktop or a mobile device
Desktop browsing does not allow you to convert
But if we use the payload then it is possible.

This URL Redirection vulnerability allows remote
Attackers to redirect users to arbitrary websites and conduct phishing attacks

[+] Dorking İn Google Or Other Search Enggine.

[+] Use payload : ?wptouch_switch=desktop&redirect=https://packetstormsecurity.com/&nonce=9d69c21a5a

[+] https://127.0.0.1/incelhr/?wptouch_switch=desktop&redirect=https://packetstormsecurity.com/&nonce=9d69c21a5a


Greetings to :=========================================================================================================================
|
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm * thelastvvv *Zigoo.eg |
|
=======================================================================================================================================

Related Posts