| Title: Reflected XSS in wordpress plugin photoxhibit v2.1.8 |
| Author: Larry W. Cashdollar, @_larry0 |
| Date: 2016-02-09 |
| Download Site: https://wordpress.org/plugins/photoxhibit |
| Downloads: 34643 |
| Vendor Notified: 2016-02-09 |
| Export: Json |
| Vendor Contact: plugins@wordpress.org |
| Plugin Name: photoxhibit |
| Vulnerability: There is a reflected XSS vulnerability in the following php code ./photoxhibit/common/inc/pages/build.php:
11: <a class="editLinks" href="admin.php?page=px_manage&action=edit_styles&gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Styles', 'photoxhibit'); ?></a>
13: <a class="editLinks" href="admin.php?page=px_manage&action=edit_image_attr&gid=<?php echo $_GET['gid'];?>"><?php _e('Edit Images', 'photoxhibit'); ?></a>
24: <input type="hidden" id="px_gidHidden" name="px_gidHidden" value="<?php echo $_GET['gid'];?>"/>
The variable gid appears to send unsanitized data back to the users browser.
|
| CVE-ID: 2016-1000143 |
| File:./photoxhibit/common/inc/pages/build.php |
| Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|