Title: Reflected XSS in wordpress plugin classyfrieds v3.8 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/classyfrieds |
Downloads: 8698 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: classyfrieds |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./classyfrieds/themefiles/blind_mail.php:
34: <input type='text' name='m_title' value='<?PHP echo $_POST['m_title']; ?>' style='width:90%'><br />
36: <textarea name='m_body' rows='5'style='width:90%'><?PHP echo $_POST['m_body']; ?></textarea>
39: <input type='text' name='m_myname' value='<?PHP echo $_POST['m_myname']; ?>' style='width:90%'>
42: <input type='email' name='m_mymail' value='<?PHP echo $_POST['m_mymail']; ?>' style='width:90%'>
The variable m_title appears to send unsanitized data back to the users browser via POST request.
|
CVE-ID: Not Released |
File:./classyfrieds/themefiles/blind_mail.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|