Exploit WordPress Plugin Relevanssi 2.7.2 - Persistent Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
16233
Проверка EDB
  1. Пройдено
Автор
SAIF EL-SHEREI
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2011-02-24
Код:
# Exploit Title: Relevanssi User Searches WordPress plugin Stored XSS
# Date: 20-2-2011
# Author: Saif El-Sherei
# Software Link: http://downloads.wordpress.org/plugin/relevanssi.2.7.2.zip
# Version: Relevanssi 2.7.2, WordPress 3.0.5
# Tested on: FireFox 3.6.13, IE 8
# Vendor Response: plugin author released an update to fix this issue

Info:

Relevanssi replaces the standard WordPress search with a better search
engine, with lots of features and configurable options. You'll get better
results, better presentation of results - your users will thank you.
downloaded 34,3963 times.

Details:

Log search queries must be enabled in the plugin settings; A stored XSS
vulnerability exists due to "search Query" variable is displayed & logged
unsanitized in the "User Searches" section in the admin Dashboard, allowing
an attacker to inject malicious HTML code.


POC:

<script>alert('XSS');</script>

Solution:

Update to latest plugin version
 
Источник
www.exploit-db.com

Похожие темы