Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310126492
HistoryOct 04, 2023 - 12:00 a.m.

WordPress User Feedback Plugin < 1.0.8 XSS Vulnerability

2023-10-0400:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
wordpress
user feedback
xss
vulnerability
cross-site scripting
surveys
update

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

The WordPress plugin

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:userfeedback:userfeedback";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.126492");
  script_version("2023-10-13T16:09:03+0000");
  script_tag(name:"last_modification", value:"2023-10-13 16:09:03 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-10-04 08:08:12 +0000 (Wed, 04 Oct 2023)");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-10-02 19:36:00 +0000 (Mon, 02 Oct 2023)");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_cve_id("CVE-2023-39308");

  script_name("WordPress User Feedback Plugin < 1.0.8 XSS Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_wordpress_plugin_http_detect.nasl");
  script_mandatory_keys("wordpress/plugin/userfeedback-lite/detected");

  script_tag(name:"summary", value:"The WordPress plugin 'User Feedback' is prone to a cross-site
  scripting (XSS) vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Stored cross-site scripting via user responses for surveys.");

  script_tag(name:"affected", value:"WordPress User Feedback plugin prior to version 1.0.8.");

  script_tag(name:"solution", value:"Update to version 1.0.8 or later.");

  script_xref(name:"URL", value:"https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/userfeedback-lite/user-feedback-107-unauthenticated-stored-cross-site-scripting");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! port = get_app_port( cpe: CPE ) )
  exit( 0 );

if( ! infos = get_app_version_and_location( cpe: CPE, port: port, exit_no_version: TRUE ) )
  exit( 0 );

version = infos["version"];
location = infos["location"];

if( version_is_less( version: version, test_version: "1.0.8" ) ) {
  report = report_fixed_ver( installed_version: version, fixed_version: "1.0.8", install_path: location );
  security_message( port: port, data: report );
  exit( 0 );
}

exit( 99 );

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Related for OPENVAS:1361412562310126492