Lucene search

K
wpexploitCarlos David Garrido LeΓ³nWPEX-ID:0B3C83AD-D490-4CA3-8589-39163EA5E24B
HistoryAug 21, 2023 - 12:00 a.m.

Appointment booking addon for Gravity Forms < 1.10.0 - Reflected Cross-Site Scripting

2023-08-2100:00:00
Carlos David Garrido LeΓ³n
29
gravity forms
xss vulnerability
appointment booking
security exploit
web form.

0.0005 Low

EPSS

Percentile

17.0%

Description The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin

1. Create a "Service" and a "Provider" under the "gAppointments" sidebar menu.
2. Create a new form within Gravity Forms. Add a "Booking Calendar" field to this form.
3. Add the form to a post or page, using the block or shortcode.
4. Visit the page as any user (authenticated or not). Choose an appointment slot in the booking calendar field. Submit the form, and intercept the request (e.g. with BurpSuite).
5. In the POST request, change the value of input_6[time] to be blank (note that it may be called something other than input_6 on your site.
6. Then, change the value of input_6[cost] (same caveat on the naming) to '/><img src=x onerror=alert(/XSS/)>
7. Submit the request and disable interception. See the alert, indicating XSS.

0.0005 Low

EPSS

Percentile

17.0%

Related for WPEX-ID:0B3C83AD-D490-4CA3-8589-39163EA5E24B