WordPress Training Membership 1.0.8 Cross Site Scripting

2017.09.10
Credit: 8bitsec
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Wordpress Fitness Trainer - Training Membership Plugin <= v1.0.8 - Authenticated Stored/Reflected XSS # Date: 2017-09-07 # Exploit Author: 8bitsec # Vendor Homepage: https://codecanyon.net/item/fitness-trainer-training-membership-plugin/19901278 # Software Link: https://codecanyon.net/item/fitness-trainer-training-membership-plugin/19901278 # Version: 1.0.8 # Tested on: [Kali Linux 2.0 | Mac OS 10.12.6] # Email: contact@8bitsec.io # Contact: https://twitter.com/_8bitsec Release Date: ============= 2017-09-07 Product & Service Introduction: =============================== Fitness Trainer - Training Membership Plugin Technical Details & Description: ================================ Authenticated Stored XSS vulnerability found on Account Settings section. Reflected XSS on profile parameter. Proof of Concept (PoC): ======================= Authenticated Stored XSS: Logged as a low priv user. Account Settings Section. Vulnerable Fields: First Name Last Name Occupation About Website URL Authenticated Reflected XSS on profile parameter: https://localhost/fitnessp/my-account/?profile=<svg/onload=alert(document.domain)> ================== 8bitsec - [https://twitter.com/_8bitsec]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top