Title: Reflected XSS in wordpress plugin bodi0s-easy-cache v0.8 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/bodi0s-easy-cache |
Downloads: 2376 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: bodi0s-easy-cache |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./bodi0s-easy-cache/bodi0-easy-cache-admin.php:
309: <form name="form-cache" id="form-cache" action="?page=<?php echo $_GET['page']; ?>" method="post">
647: <a accesskey="d" href="?page=<?php echo $_GET['page']; ?>&restore=defaults&_wpnonce=<?php echo wp_create_nonce( 'easy-cache-nonce' ) ?>" class="button-secondary cancel"><?php _e("Restore default settings", "bodi0-easy-cache"); ?></a>
774:<p> <a href="?page=<?php echo $_GET['page']?>&_wpnonce=<?php echo wp_create_nonce( 'easy-cache-nonce' ) ?>" class="alignright" >
874: <a accesskey="c" href="?page=<?php echo $_GET['page']; ?>&delete-cache=reset&_wpnonce=<?php echo wp_create_nonce( 'easy-cache-nonce' ) ?>" class="button-secondary cancel"><?php _e("Delete all cached files", "bodi0-easy-cache"); ?></a>
877: <a accesskey="s" href="?page=<?php echo $_GET['page']; ?>&delete-css=reset&_wpnonce=<?php echo wp_create_nonce( 'easy-cache-nonce' ) ?>" class="button-secondary cancel"><?php _e("Delete combined and minified CSS file", "bodi0-easy-cache"); ?></a>
The variable page appears to send unsanitized data back to the users browser.
|
CVE-ID: Not Released |
File:./bodi0s-easy-cache/bodi0-easy-cache-admin.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|