Title: Reflected XSS in wordpress plugin wp-simple-event-management-system v0.9.9rc3 |
Author: Larry W. Cashdollar, @_larry0 |
Date: 2016-02-09 |
Download Site: https://wordpress.org/plugins/wp-simple-event-management-system |
Downloads: 6295 |
Vendor Notified: 2016-02-09 |
Export: Json |
Vendor Contact: plugins@wordpress.org |
Plugin Name: wp-simple-event-management-system |
Vulnerability: There is a reflected XSS vulnerability in the following php code ./wp-simple-event-management-system/includes/itg-em-admin-list-atd.php:
104: $.post( "admin-ajax.php", { action: "itg_em_list_atd_ajax", id: id, start_date: "<?php echo $_POST['start_date']; ?>", end_date: "<?php echo $_POST['end_date']; ?>" }, function(data) {
The variable start_date appears to send unsanitized data back to the users browser via POST request.
|
CVE-ID: Not Released |
File:./wp-simple-event-management-system/includes/itg-em-admin-list-atd.php |
Exploit Code: Exploit was derived from appearance of first vulnerable parameter in code, there could be more shown above.
|