Title: Reflected XSS in wordpress plugin wp-survey-and-quiz-tool v2.14 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/wp-survey-and-quiz-tool |
Downloads: 152221 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: wp-survey-and-quiz-tool |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./wp-survey-and-quiz-tool/pages/admin/questions/index.php:
48: <a href="<?php echo WPSQT_URL_MAIN; ?>§ion=questions&subsection=<?php echo urlencode($_GET['subsection']); ?>&type=<?php echo $type; ?>&id=<?php echo $_GET['id'];?>" <?php if (isset($_GET['type']) && $type == $_GET['type']) { ?> class="current"<?php } ?>><?php echo $type; ?> <span class="count">(<?php echo $question_counts[$friendlyType.'_count']; ?>)</span></a>
The variable subsection appears to send unsanitized data back to the users browser.
|
CVE-ID: Not Released |
File:./wp-survey-and-quiz-tool/pages/admin/questions/index.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|