Lucene search

K
wpvulndbRobert SætherWPVDB-ID:070648AA-9928-425D-A189-9AE3481F3875
HistoryMay 06, 2016 - 12:00 a.m.

safe-editor <= 1.1 - Unauthenticated CSS/JS-injection

2016-05-0600:00:00
Robert Sæther
wpscan.com
5

0.001 Low

EPSS

Percentile

40.8%

When saving JS/CSS in this plugin then both private and public ajax-hooks are being used. Because of this anyone can post JS/CSS that are saved to the db and printed to the head and footer portion of the page.

PoC

In the file β€œindex.php” (in root folder) on line 188 and 189 you can see that both private and public ajax-hooks are called and is referencing to the function β€œse_save”. This function does not do any authentication check or string sanitizing. Therefore you can inject whatever you want where the β€œwp_footer” and β€œwp_head” is called. With the use of for example cUrl or the chromeapp Postman this can be exploited with ease. Example: URL: http://www.site.com/wp-admin/admin-ajax.php (Postdata displayed in JSON) # JS injection { type: β€˜js’, data: β€˜alert(β€œHello world!”);’, action: β€˜se_save’ } # CSS injection { type: β€˜css’, data: β€˜body { display: none !important; }’, action: β€˜se_save’ }

CPENameOperatorVersion
safe-editorlt1.2

0.001 Low

EPSS

Percentile

40.8%

Related for WPVDB-ID:070648AA-9928-425D-A189-9AE3481F3875