* Discovery Date: 2015/10/20
* Public Disclosure Date: 2015/12/01
* Exploit Author: Panagiotis Vagenas
* Contact: https://twitter.com/panVagenas
* Vendor Homepage: http://usersultra.com
* Software Link: https://wordpress.org/plugins/
* Version: 1.5.50
* Tested on: WordPress 4.3.1
* Category: webapps
Description
==============================
Once a user is registered he can add new subscription packages or modify existing ones. No data sanitization is
taking place before saving package details in DB. This allows a malicious user to include JS code in package name
and/or package description.
PoC
==============================
- Send a post request to `http://vuln.site.tld/wp-
`action=package_add_new&p_
- Visit `http://vuln.site.tld/wp-
contains package information at front end.
Timeline
==============================
2015/10/29 - Vendor notified via email
2015/11/11 - Vendor notified via contact form in his website
2015/11/13 - Vendor notified via support forums at wordpress.org
2015/11/14 - Vendor responded and received report through email
Solution
==============================
No official solution yet exists.
Komentarų nėra:
Rašyti komentarą