Title: Reflected XSS in wordpress plugin skedmaker-online-scheduling v0.98 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/skedmaker-online-scheduling |
Downloads: 2666 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: skedmaker-online-scheduling |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./skedmaker-online-scheduling/_admin/_blocktime.php:
23:<form id="formblock" name="formblock" method="post" action="<?php echo $smadmin;?>&v=blocktime&ts=<?php echo $_GET['ts'];?>&" style='margin: 0px; padding: 0px;'>
37:<a href='<?php echo $smadmin;?>&v=home&ts=<?php echo $_GET['ts']; ?>&' class='sked'><img src='<?php echo $sm_btns_dir;?>btn_home16_reg.png' class='btn' />No, Return to Admin Home Page</a>
The variable ts appears to send unsanitized data back to the users browser.
|
CVE-ID: Not Released |
File:./skedmaker-online-scheduling/_admin/_blocktime.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|