[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress MDC Private Message Plugin 1.0.0 - Persistent XSS Vulnerability

Author
Chris Kellum
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-24107
Category
web applications
Date add
21-08-2015
Platform
php
# Exploit Title: WordPress MDC Private Message Persistent XSS
# Date: 8/20/15
# Exploit Author: Chris Kellum
# Vendor Homepage: http://medhabi.com/
# https://wordpress.org/plugins/mdc-private-message/
# Version: 1.0.0
 
 
 
=====================
Vulnerability Details
=====================
 
The 'message' field doesn't sanitize input, allowing a less privileged user (Editor, Author, etc.)
to execute an XSS attack against an Administrator.
 
Proof of Concept: 
 
Place <script>alert('Hello!')</script> in the message field of a private message and then submit.
 
Open the message and the alert window will fire.
 
===================
Disclosure Timeline
===================
 
8/16/15 - Vendor notified.
8/19/15 - Version 1.0.1 released.
8/20/15 - Public Disclosure.

#  0day.today [2024-11-16]  #