Title: Reflected XSS in wordpress plugin photoxhibit v2.1.8 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/photoxhibit |
Downloads: 34643 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: photoxhibit |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./photoxhibit/common/inc/pages/edit_styles.php:
30:<form action="admin.php?page=px_manage&action=edit_styles&do=editStyles&gid=<?php echo $_GET['gid'];?>" method="post">
36: <a class="editLinks" href="admin.php?page=px_manage&action=edit_image_attr&gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Images', 'photoxhibit'); ?></a>
38: <a class="editLinks" href="admin.php?page=px_build&gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Gallery', 'photoxhibit'); ?></a>
48: <input type="hidden" name="gid" id="px_gid" value="<?php echo $_GET['gid'];?>"/>
The variable gid appears to send unsanitized data back to the users browser.
|
CVE-ID: 2016-1000144 |
File:./photoxhibit/common/inc/pages/edit_styles.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|