WordPress Tagregator 0.6 Cross Site Scripting

2018.08.21
Credit: ManhNho
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 3.5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 6.8/10
Exploit range: Remote
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# Exploit Title: WordPress Plugin Tagregator 0.6 - Cross-Site Scripting # Date: 2018-05-05 # Exploit Author: ManhNho # Vendor Homepage: https://wordpress.org/plugins/tagregator/ # Software Link: https://downloads.wordpress.org/plugin/tagregator.0.6.zip # Ref: https://pastebin.com/ZGr5tyP2 # Version: 0.6 # Tested on: CentOS 6.5 # CVE : CVE-2018-10752 # Category : Webapps # 1. Description # WordPress Plugin Tagregator 0.6 - Stored XSS # 2. Proof of Concept 1. Login to admin panel 2. Access to Wordpress Tagregator setting, then choose Tweets/Instagram Media/Flickr Post/Google+ Activities and click "Add New" button 3. In title field, inject XSS pattern such as: <script>alert('xss')</script> and click Preview button 4. This site will response url that will alert popup named xss 5. Send this xss url to another administrators, we have same alert


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top