Title: Reflected XSS in wordpress plugin simpel-reserveren v3.5.2 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/simpel-reserveren |
Downloads: 190 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: simpel-reserveren |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./simpel-reserveren/edit.php:
74: <td><a href="?page=<?php echo $_GET['page'] ?>&id=<?php echo $camping->id ?>"><?php echo $camping->title ?></a></td>
The variable page appears to send unsanitized data back to the users browser.
|
CVE-ID: 2016-1000149 |
File:./simpel-reserveren/edit.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|