Title: Reflected XSS in wordpress plugin wp-post-type-ui v0.5.2 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/wp-post-type-ui |
Downloads: 5863 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: wp-post-type-ui |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./wp-post-type-ui/wp-post-type-ui.php:
277: <input type="hidden" value="<?php echo $_GET['page']; ?>" name="page">
280: <input type="text" value="<?php echo $_GET['s']; ?>" name="s" id="tag-search-input">
294: <?php if(isset($_GET['action'])) : ?><input type="button" value="Add New Post Type" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?>
295: <?php if(isset($_GET['s'])) : ?><input type="button" value="Cancel Post Type Search" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?>
340: <td class="name column-name"><strong><a title="Edit <?php echo $post_type['labels']['name']; ?>" href="?page=<?php echo $_GET['page'] ?>&action=edit_post_type&i=<?php echo $index; ?>" class="row-title"><?php echo $post_type['labels']['name']; ?></a></strong><br><div class="row-actions"><span class="edit"><a href="?page=<?php echo $_GET['page'] ?>&action=edit_post_type&i=<?php echo $index; ?>">Edit</a> | </span><span class="trash"><a class="submitdelete" href="?page=<?php echo $_GET['page'] ?>&action=delete_post_type&i=<?php echo $index; ?>">Delete</a></span></div></td>
642: <input type="hidden" value="<?php echo $_GET['page']; ?>" name="page">
645: <input type="text" value="<?php echo $_GET['s']; ?>" name="s" id="tag-search-input">
656: <?php if(isset($_GET['action'])) : ?><input type="button" value="Add New Taxonomy" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?>
657: <?php if(isset($_GET['s'])) : ?><input type="button" value="Cancel Taxonomy Search" onclick="location.href='?page=<?php echo $_GET['page']; ?>'" class="button"><?php endif; ?>
699: <td class="name column-name"><strong><a href="#" class="row-title"><?php echo $taxonomy['args']['labels']['name']; ?></a></strong><br><div class="row-actions"><span class="edit"><a href="?page=<?php echo $_GET['page'] ?>&action=edit_taxonomy&i=<?php echo $index; ?>">Edit</a> | </span><span class="trash"><a class="submitdelete" href="?page=<?php echo $_GET['page'] ?>&action=delete_taxonomy&i=<?php echo $index; ?>">Delete</a></span></div></td>
The variable page and s appear to send unsanitized data back to the users browser.
|
CVE-ID: Not Released |
File:./wp-post-type-ui/wp-post-type-ui.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|