WordPress Gallery 4.2.1 Cross Site Scripting

2015.12.17
Credit: Madhu Akula
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Plugin Name : Gallery Effected Version : 4.2.1 (and most probably lower version's if any) Vulnerability : A3-Cross-Site Scripting (XSS) Identified by : Madhu Akula Technical Details Minimum Level of Access Required : Administrator PoC - (Proof of Concept) : The following fields put the payload as below http://localhost/wp-admin/admin.php?page=gallery-plugin.php gllr_return_link_text = ?><script>alert(1)</script> gllr_read_more_link_text = ?><script>alert(2)</script> Vulnerable Parameter : gllr_return_link_text, gllr_read_more_link_text Type of XSS : Stored Fixed in : 4.2.2 http://wordpress.org/plugins/gallery-plugin/changelog/ Disclosure Timeline Vendor Contacted : 2014-08-04 Plugin Status : Updated on 2014-08-07 Public Disclosure : October 3, 2015 CVE Number : Not assigned yet Plugin Description : This plugin makes it possible to implement as many galleries as you want into your website. You can add multiple pictures and description for each gallery, show them all at one page, view each one separately. Moreover, you can upload HQ images. Regular updates and simplicity of usage along with efficient functionality make it a perfect choice for your site to have an appealing look. There is also a premium version of the plugin with more useful features available.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top