[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress Strong Testimonials 2.31.4 Cross Site Scripting Vulnerability

Author
Neven Biruski
Risk
[
Security Risk Low
]
0day-ID
0day-ID-30782
Category
web applications
Date add
27-07-2018
Platform
php
Advisory Title: WordPress Strong Testimonials Plugin Multiple XSS
 Vulnerabilities
Advisory URL:   http://www.defensecode.com/advisories.php
Software:       WordPress Strong Testimonials plugin
Language:       PHP
Version:        2.31.4 and below
Vendor Status:  Vendor contacted, update released
Release Date:   2018/07/24
Risk:           Medium



1. General Overview
===================
During the security audit of Strong Testimonials plugin for WordPress
CMS, multiple XSS vulnerabilities were discovered using DefenseCode
ThunderScan application source code security analysis platform.

More information about ThunderScan is available at URL:
http://www.defensecode.com


2. Software Overview
====================
According to the plugin developers, with Strong Testimonials plugin
you will be collecting and publishing your testimonials or reviews.
Beginners and pros alike will appreciate the wealth of flexible
features refined over 4 years from user feedback and requests.

According to wordpress.org, it has more than 50,000 active installs.

Homepage:
https://wordpress.org/plugins/strong-testimonials/


3. Vulnerability Description
============================
During the security analysis, ThunderScan discovered Cross-Site
Scripting vulnerabilities in Strong Testimonials WordPress plugin.

The Cross-Site Scripting vulnerability can enable the attacker to
construct the URL that contains malicious JavaScript code. If the
administrator of the site makes a request to such an URL, the
attacker's code will be executed, with unrestricted access to the
WordPress site in question. The attacker can entice the administrator
to visit the URL in various ways, including sending the URL by email,
posting it as a part of the comment on the vulnerable site or another
forum.

3.1 Cross-Site Scripting
  Vulnerable Function:  echo()
  Vulnerable Variable:  $_REQUEST['id']
  Vulnerable URL:
http://vulnerablesite.com/wp-admin/edit.php?post_type=wpm-testimonial&page=testimonial-views&action=edit&id=2"></script><script>alert(42)</script>
  File:                 strong-testimonials/admin/views.php
  ---------
  48  wpmtst_view_settings( $_REQUEST['action'], $_REQUEST['id'] );
  ...
  106 function wpmtst_view_settings( $action = '', $view_id = null ) {
  ...
  213 <input type="hidden" name="view[id]" value="<?php echo $view_id; ?>">
  ---------

3.2 Cross-Site Scripting
  Vulnerable Function:  echo()
  Vulnerable Variable:  $_REQUEST['id']
  Vulnerable URL:
http://vulnerablesite.com/wp-admin/edit.php?post_type=wpm-testimonial&page=testimonial-views&action=edit&id=2"></script><script>alert(42)</script>
  File:                 strong-testimonials/admin/views.php
  ---------
  48  wpmtst_view_settings( $_REQUEST['action'], $_REQUEST['id'] );
  ...
  106 function wpmtst_view_settings( $action = '', $view_id = null ) {
  ...
  219 <?php include( 'partials/views/view-shortcode.php' ); ?>
  ---------
  File:
strong-testimonials/admin/partials/views/view-shortcode.php
  ---------
  5   $shortcode .= '<input id="view-shortcode" type="text"
value="[testimonial_view id="' . $view_id . '"]" readonly
/>';
  ...
  21  <?php echo $shortcode; ?>
  ---------


4. Solution
===========
After the vulnerabilities were reported the vendor resolved the
security issues. All users are strongly advised to update WordPress
Strong Testimonials plugin to the latest available version.

#  0day.today [2024-11-16]  #