ID CVE-2020-7228 Type cve Reporter cve@mitre.org Modified 2020-01-24T22:02:00
Description
The Calculated Fields Form plugin through 1.0.353 for WordPress suffers from multiple Stored XSS vulnerabilities present in the input forms. These can be exploited by an authenticated user.
{"openvas": [{"lastseen": "2020-02-12T14:48:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-7228"], "description": "The WordPress plugin Calculated Fields Form is prone to multiple stored\n cross-site scripting (XSS) vulnerabilities.", "modified": "2020-02-07T00:00:00", "published": "2020-01-24T00:00:00", "id": "OPENVAS:1361412562310113633", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310113633", "type": "openvas", "title": "WordPress Calculated Fields Form Plugin <= 1.0.353 XSS Vulnerabilities", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.113633\");\n script_version(\"2020-02-07T08:57:05+0000\");\n script_tag(name:\"last_modification\", value:\"2020-02-07 08:57:05 +0000 (Fri, 07 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-24 12:37:26 +0000 (Fri, 24 Jan 2020)\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:P/A:N\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_cve_id(\"CVE-2020-7228\");\n\n script_name(\"WordPress Calculated Fields Form Plugin <= 1.0.353 XSS Vulnerabilities\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_wordpress_plugin_http_detect.nasl\");\n script_mandatory_keys(\"calculated-fields-form/detected\");\n\n script_tag(name:\"summary\", value:\"The WordPress plugin Calculated Fields Form is prone to multiple stored\n cross-site scripting (XSS) vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The vulnerabilities reside within the input forms and\n can be exploited by an authenticated user.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation would allow an attacker to\n inject arbitrary HTML and JavaScript into the site.\");\n\n script_tag(name:\"affected\", value:\"WordPress plugin Calculcated Fields Form through version 1.0.353.\");\n\n script_tag(name:\"solution\", value:\"Update to version 1.0.354 or later.\");\n\n script_xref(name:\"URL\", value:\"https://wordpress.org/plugins/calculated-fields-form/#developers\");\n script_xref(name:\"URL\", value:\"https://wpvulndb.com/vulnerabilities/10043\");\n script_xref(name:\"URL\", value:\"https://spider-security.co.uk/blog-cve-2020-7228\");\n\n exit(0);\n}\n\n\nCPE = \"cpe:/a:codepeople:calculated-fields-form\";\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! port = get_app_port( cpe: CPE ) ) exit( 0 );\nif( ! infos = get_app_version_and_location( cpe: CPE, port: port, exit_no_version: TRUE ) ) exit( 0 );\n\nversion = infos[\"version\"];\nlocation = infos[\"location\"];\n\nif( version_is_less_equal( version: version, test_version: \"1.0.353\" ) ) {\n report = report_fixed_ver( installed_version: version, fixed_version: \"1.0.354\", install_path: location );\n security_message( data: report, port: port );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}], "wpvulndb": [{"lastseen": "2020-12-20T18:10:28", "bulletinFamily": "software", "cvelist": ["CVE-2020-7228"], "description": "\"An authenticated user with access to edit or create Calculated Fields Form content can inject javascript into input fields such as \u2018field name\u2019 and \u2018form name\u2019.\"\n", "modified": "2020-09-22T08:25:36", "published": "2020-01-22T00:00:00", "id": "WPVDB-ID:10043", "href": "https://wpvulndb.com/vulnerabilities/10043", "type": "wpvulndb", "title": "Calculated Fields Form < 1.0.354 - Authenticated Stored XSS", "sourceData": "", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}]}