Title: Reflected XSS in wordpress plugin bsdevat-importer-serendipity v0.0.1 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/bsdevat-importer-serendipity |
Downloads: 469 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: bsdevat-importer-serendipity |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./bsdevat-importer-serendipity/form/s9y.php:
41: <td><input type="text" name="s9y_host" value="<?php echo $_POST['s9y_host']?>" /></td>
46: <td><input type="text" name="s9y_port" size="6" maxlength="5" value="<?php echo $_POST['s9y_port']?>" /></td>
51: <td><input type="text" name="s9y_user" value="<?php echo $_POST['s9y_user']?>" /></td>
61: <td><input type="text" name="s9y_name" value="<?php echo $_POST['s9y_name']?>" /></td>
66: <td><input type="text" name="s9y_prefix" value="<?php echo $_POST['s9y_prefix']?>" /></td>
The variable s9y_host appears to send unsanitized data back to the users browser via POST request.
|
CVE-ID: Not Released |
File:./bsdevat-importer-serendipity/form/s9y.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|