lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <571BBFA1.8090408@gmail.com> Date: Sun, 24 Apr 2016 00:02:01 +0530 From: Rahul Pratap Singh <techno.rps@...il.com> To: bugtraq@...urityfocus.com Subject: Unlimited Pop-Ups WordPress Plugin XSS Vulnerability ## FULL DISCLOSURE #Product : Unlimited Pop-Ups WordPress Plugin #Exploit Author : Rahul Pratap Singh #Version : 1.4.3 #Home page Link : http://codecanyon.net/item/unlimited-popups-wordpress-plugin/8575498 #Website : 0x62626262.wordpress.com #Linkedin : https://in.linkedin.com/in/rahulpratapsingh94 #Date : 21/4/2016 XSS Vulnerability: ---------------------------------------- Description: ---------------------------------------- "callback, shortcode, id, and page" parameters are not sanitized that leads to Reflected XSS. ---------------------------------------- Vulnerable Code: ---------------------------------------- File Name: testfiles/Unlimited Pop-Ups WordPress Plugin/upload/cj-popups/framework/includes/admin_form.php Found at line:1319 echo '<form action="'.admin_url('admin.php?page='.cjpopups_item_info('page_slug').'&callback='.@...ET['callback'].'').'" method="post" enctype="multipart/form-data">'; File Name: testfiles/Unlimited Pop-Ups WordPress Plugin/upload/cj-popups/framework/includes/admin_ajax.php Found at line:162 echo '<form action="" method="post" id="cj-shortcode-settings-form" data-shortcode-stype="'.$shortcode_options['stype'].'" data-shortcode-name="'.$_POST['shortcode'].'">'; File Name: testfiles/Unlimited Pop-Ups WordPress Plugin/upload/cj-popups/framework/includes/sample-code/dynamic-sidebar-setup/theme_dynamic_sidebars.php Found at line:139 <td><?php echo $_GET['id']; ?></td> File Name: testfiles/Unlimited Pop-Ups WordPress Plugin/upload/cj-popups/framework/includes/options/core_import_export.php Found at line:94 echo '<form class="margin-30-top" action="'.admin_url('admin.php?page='.@...ET['page'].'&callback='.@...ET['callback'].'').'" method="post" enctype="multipart/form-data">'; ---------------------------------------- Fix: Update to 1.4.4 Vulnerability Disclosure Timeline: → March 12, 2016 – Bug discovered, initial report to Vendor → March 14, 2016 – Vendor Acknowledged → March 30, 2016 – Vendor Deployed a Patch Pub Ref: https://0x62626262.wordpress.com/2016/04/21/unlimited-pop-ups-wordpress-plugin-xss-vulnerability/ http://codecanyon.net/item/unlimited-popups-wordpress-plugin/8575498 Download attachment "0xE5D04434.asc" of type "application/pgp-keys" (61463 bytes) Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists