Method: Wpxf::Exploit::AppointmentScheduleBookingSystemStoredXssShellUpload#initialize

Defined in:
lib/wpxf/modules/exploit/xss/stored/appointment_schedule_booking_system_stored_xss_shell_upload.rb

#initializeAppointmentScheduleBookingSystemStoredXssShellUpload

Returns a new instance of AppointmentScheduleBookingSystemStoredXssShellUpload.



6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
# File 'lib/wpxf/modules/exploit/xss/stored/appointment_schedule_booking_system_stored_xss_shell_upload.rb', line 6

def initialize
  super

  update_info(
    name: 'Appointment Schedule Booking System Unauthenticated Stored XSS Shell Upload',
    author: [
      'White Fir Design', # Disclosure
      'rastating'         # WPXF module
    ],
    references: [
      ['WPVDB', '8634'],
      ['URL', 'https://www.pluginvulnerabilities.com/2016/10/03/persistent-cross-site-scripting-xss-vulnerability-in-wordpress-appointment-schedule-booking-system/']
    ],
    date: 'Oct 04 2016'
  )
end