Lucene search

K
htbridgeHigh-Tech BridgeHTB23232
HistorySep 10, 2014 - 12:00 a.m.

Cross-Site Scripting (XSS) in Photo Gallery WordPress plugin

2014-09-1000:00:00
High-Tech Bridge
www.htbridge.com
34

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.011 Low

EPSS

Percentile

82.8%

High-Tech Bridge Security Research Lab discovered three vulnerabilities in Photo Gallery WordPress plugin, which can be exploited to perform Cross-Site Scripting (XSS) attacks.

  1. Cross-Site Scripting (XSS) in Photo Gallery WordPress plugin: CVE-2014-6315

1.1 Input passed via the “callback” HTTP GET parameter to “/wp-admin/admin-ajax.php” script is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in victim’s browser in context of the vulnerable website.

The exploitation example below uses the “alert()” JavaScript function to display “immuniweb” word:

http://[host]/wp-admin/admin-ajax.php?action=addImages&width=700&height=550& extensions=jpg&callback=%27%22%3E%3C/script%3E%3Cscript%3Ealert%28/immuniweb /%29;%3C/script%3E

1.2 Input passed via the “dir” HTTP GET parameter to “/wp-admin/admin-ajax.php” script is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in victim’s browser in context of the vulnerable website.

The exploitation example below uses the “alert()” JavaScript function to display “immuniweb” word:

http://[host]/wp-admin/admin-ajax.php?action=addImages&width=700&height=550& extensions=jpg&dir=%27%22%3E%3C/script%3E%3Cscript%3Ealert%28/immuniweb/%29; %3C/script%3E

1.3 Input passed via the “extensions” HTTP GET parameter to “/wp-admin/admin-ajax.php” script is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in victim’s browser in context of the vulnerable website.

The exploitation example below uses the “alert()” JavaScript function to display “immuniweb” word:

http://[host]/wp-admin/admin-ajax.php?action=addImages&width=700&height=550& extensions=%27%22%3E%3C/script%3E%3Cscript%3Ealert%28/immuniweb/%29;%3C/scri pt%3E

CPENameOperatorVersion
photo gallery wordpress pluginle1.1.30

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.011 Low

EPSS

Percentile

82.8%