GD bbPress Attachments 2.5 – Authenticated stored XSS

Info Product: GD bbPress Attachments Version: 2.5 Active installations: 10,000+ Product page: https://it.wordpress.org/plugins/gd-bbpress-attachments/ Description An authenticated user of a bbPress forum, who can attach a file, can inject arbitrary javascript code via filename. The arbitrary code runs both on the topic page and in the admin panel, and it only affects the administrators, moderators and the attacker. The variable $error['file'] in **/code/**attachments/front.php (line 349) is not escaped. Proof of Concept GD bbPress Attachments 2....

May 13, 2018 · 1 min · 104 words · Luigi Gubello

WP Live Chat Support 8.0.05 – Stored XSS

Info Product: WP Live Chat Support Version: 8.0.05 Active installations: 50,000+ Product page: https://wordpress.org/plugins/wp-live-chat-support/ CVE: 2018-9864 1. Description An unauthenticated user could inject arbitrary javascript code in the admin panel by using the text field Name of WP Live Chat Support. Using a single input point it was possible to inject javascript code into two different output points of the admin panel. There were two issues in the external javascript file bleeper-agent-dev....

April 8, 2018 · 2 min · 340 words · Luigi Gubello

Events Manager 5.8.1.1 – Stored XSS

Info Product: Events Manager Version: 5.8.1.1 Active installations: 100,000+ Product page: https://it.wordpress.org/plugins/events-manager/ CVE: 2018-9020 Description An unauthenticated user or a user without privileges, who can submit an event, can inject javascript code in the Google Maps miniature. The malicious code runs in the admin panel when a user with privileges opens the submitted event. The problem is in the file events-manager.js, the variable mapTitle is not escaped. Proof of Concept Events Manager 5....

March 25, 2018 · 1 min · 124 words · Luigi Gubello

Bookly #1 WordPress Booking Plugin (Lite) 13.2 – Blind Stored XSS

Info Product: Bookly #1 WordPress Booking Plugin (Lite Version) Version: 13.2 Active installations: 10,000+ Product page: https://wordpress.org/plugins/bookly-responsive-appointment-booking-tool/ CVE: 2018-6891 Description An unauthenticated user can inject arbitrary persistent javascript code in the admin panel. Proof of Concept Bookly Lite 13.2 and Bookly Pro 14.5 are affected, probably even earlier versions. I think the problem is that jQuery.ajax request is not sanitized in ng-payment_details_dialog.js. [*] 07/01/2018 - I send the report 26/01/2018 - Bookly Lite is updated to version 14....

February 9, 2018 · 1 min · 105 words · Luigi Gubello