Title: Reflected XSS in wordpress plugin tiny-feedback-bar-by-gekko v0.3.6 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/tiny-feedback-bar-by-gekko |
Downloads: 845 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: tiny-feedback-bar-by-gekko |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./tiny-feedback-bar-by-gekko/includes/functions/ajax.php:
619: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td>
651: <input name="page_id" type="hidden" value="<?php echo $_GET['page_id']; ?>" />
674: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td>
730: <input name="page_id" type="hidden" value="<?php echo $_GET['page_id']; ?>" />
758: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td>
787: <input name="page_id" type="hidden" value="<?php echo $_GET['page_id']; ?>" />
810: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td>
839: <input name="page_id" type="hidden" value="<?php if (isset($_GET['page_id'])) { echo $_GET['page_id']; } ?>" />
The variable msg appears to send unsanitized data back to the users browser.
|
CVE-ID: Not Released |
File:./tiny-feedback-bar-by-gekko/includes/functions/ajax.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|