Title: Reflected XSS in wordpress plugin hdw-tube v1.2 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/hdw-tube |
Downloads: 3409 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: hdw-tube |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./hdw-tube/mychannel.php:
290: var channelid = '<?php echo $_GET['channel']?>';
299: var channelid = '<?php echo $_GET['channel']?>';
422: $hdwt.post(location.href,{comment_message:mess,comment_name:myname,comment_image:myimage,channel_id_comment:'<?php echo $_GET['channel'];?>'}, function( data ) {
The variable channel appears to send unsanitized data back to the users browser.
|
CVE-ID: 2016-1000135 |
File:./hdw-tube/mychannel.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|