Title: Reflected XSS in wordpress plugin mycommentauthors v1.5 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/mycommentauthors |
Downloads: 534 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: mycommentauthors |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./mycommentauthors/mca-home.php:
117: <td><input name="ltype" type="text" id="ltype" value="<?php if(isset($_POST['ltype'])) { echo $_POST['ltype']; } else { echo"20"; } ?>" size="1" maxlength="3" />
138: <td><input name="mca_page_break" type="text" id="mca_page_break" value="<?php if(isset($_POST['mca_page_break'])) { echo $_POST['mca_page_break']; } else { echo"0"; } ?>" size="3" maxlength="3" /></td>
The variable ltype appears to send unsanitized data back to the users browser via POST request.
|
CVE-ID: Not Released |
File:./mycommentauthors/mca-home.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|