lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <571BBFA1.8090408@gmail.com>
Date: Sun, 24 Apr 2016 00:02:01 +0530
From: Rahul Pratap Singh <techno.rps@...il.com>
To: bugtraq@...urityfocus.com
Subject: Unlimited Pop-Ups WordPress Plugin XSS Vulnerability

## FULL DISCLOSURE

#Product : Unlimited Pop-Ups WordPress Plugin
#Exploit Author : Rahul Pratap Singh
#Version : 1.4.3
#Home page Link :
http://codecanyon.net/item/unlimited-popups-wordpress-plugin/8575498
#Website : 0x62626262.wordpress.com
#Linkedin : https://in.linkedin.com/in/rahulpratapsingh94
#Date : 21/4/2016

XSS Vulnerability:

----------------------------------------
Description:
----------------------------------------
"callback, shortcode, id, and page"  parameters are not sanitized that
leads to Reflected XSS.

----------------------------------------
Vulnerable Code:
----------------------------------------

File Name: testfiles/Unlimited Pop-Ups WordPress
Plugin/upload/cj-popups/framework/includes/admin_form.php
Found at line:1319
echo '<form
action="'.admin_url('admin.php?page='.cjpopups_item_info('page_slug').'&callback='.@...ET['callback'].'').'"
method="post" enctype="multipart/form-data">';

File Name: testfiles/Unlimited Pop-Ups WordPress
Plugin/upload/cj-popups/framework/includes/admin_ajax.php
Found at line:162
echo '<form action="" method="post" id="cj-shortcode-settings-form"
data-shortcode-stype="'.$shortcode_options['stype'].'"
data-shortcode-name="'.$_POST['shortcode'].'">';

File Name: testfiles/Unlimited Pop-Ups WordPress
Plugin/upload/cj-popups/framework/includes/sample-code/dynamic-sidebar-setup/theme_dynamic_sidebars.php
Found at line:139
<td><?php echo $_GET['id']; ?></td>

File Name: testfiles/Unlimited Pop-Ups WordPress
Plugin/upload/cj-popups/framework/includes/options/core_import_export.php
Found at line:94
echo '<form class="margin-30-top"
action="'.admin_url('admin.php?page='.@...ET['page'].'&callback='.@...ET['callback'].'').'"
method="post" enctype="multipart/form-data">';
----------------------------------------

Fix:
Update to 1.4.4

Vulnerability Disclosure Timeline:
→ March 12, 2016  – Bug discovered, initial report to Vendor
→ March 14, 2016  – Vendor Acknowledged
→ March 30, 2016  – Vendor Deployed a Patch

Pub Ref:
https://0x62626262.wordpress.com/2016/04/21/unlimited-pop-ups-wordpress-plugin-xss-vulnerability/
http://codecanyon.net/item/unlimited-popups-wordpress-plugin/8575498

Download attachment "0xE5D04434.asc" of type "application/pgp-keys" (61463 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ