Reporter Tom Adams
Software: The Events Calendar: Eventbrite Tickets
Advisory report: https://security.dxw.com/advisories/reflected-xss-in-the-events-calendar-eventbrite-tickets-allows-unauthenticated-users-to-do-almost-anything-an-admin-can/
CVSS: 5.8 (Medium; AV:N/AC:M/Au:N/C:P/I:P/A:N)
Reflected XSS in The Events Calendar: Eventbrite Tickets allows unauthenticated users to do almost anything an admin can
This plugin contains a Reflected XSS vulnerability (views/eventbrite/import-eventbrite-events.php line 14).
If an administrator can be tricked into clicking on a link controlled by the attacker, then an attacker would also be able to automate anything an admin could do, for example creating and deleting user accounts and creating and deleting content. There would be almost no way to tell that this was happening, and it is easy to make these links very convincing.
Proof of concept
Configure the plugin by creating an Eventbrite account, creating an application, going through the OAuth process, etc.
Using a browser with no XSS prevention (e.g. firefox), visit the following URL:
Upgrade to version 3.10.2 or later
dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy: https://security.dxw.com/disclosure/
Please contact us on firstname.lastname@example.org to acknowledge this report if you received it via a third party (for example, email@example.com) as they generally cannot communicate with us on your behalf.
This vulnerability will be published if we do not receive a response to this report with 14 days.
2015-07-09: Reported to vendor via the contact form on The Events Calendar website
2015-07-09: Requested CVE
2015-07-09: Vendor responded
2015-07-10: Vendor confirmed fixed in 3.10.2
Discovered by dxw:
Please visit security.dxw.com for more information.