Advertisement






WordPress Add Link To Facebook 1.215 Cross Site Scripting

CVE Category Price Severity
CVE-2021-24551 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2015-04-22
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L 0.999 0.999

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2015040127

Below is a copy:

Title: Stored XSS Vulnerability in Add Link to Facebook Wordpress Plugin

Author: Rohit Kumar

Plugin Homepage: http://wordpress.org/extend/plugins/add-link-to-facebook/

Severity: Medium

Version Affected: Version 1.215 and mostly prior to it.

Version Tested: Version 1.215

Version Patched : 1.215

Description:

Vulnerable Parameter
1. App ID
2. App Secret
3. Custom Picture URL
4. Default Picture URL
5. URL News Feed Icon

About Vulnerability
This plugin is vulnerable to Stored Cross Site Scripting Vulnerability. This issue was exploited when user
accessed to Add Link to Facebook Settings in Wordpress with Administrator privileges. A malicious
administrator can hijack other users sessions, take control of another administrators browser or install
malware on their computer.

Vulnerability Class:
Cross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS))

Steps to Reproduce:
After installing the plugin:
 Goto Settings All in One Facebook
 Input this payload in App ID :- ><script>alert(1)</script>
 Click on the Save button.
 After reloading the page you will see a Pop Up Box with 1 written on it.
 Reload the page again to make sure its stored.

Change Log
https://wordpress.org/plugins/add-link-to-facebook/changelog/

Disclosure
09th March 2015

CommentsRSS Feed

No comments yet, be the first!
Login or Register to post a comment

    Follow on Twitter Follow us on Twitter
    Follow on Facebook Follow us on Facebook
    View RSS Feeds Subscribe to an RSS Feed

File Archive:
April 2015 


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum