ID WPVDB-ID:9C538C51-AE58-461D-B93B-CC9DFEBF2BC0 Type wpvulndb Reporter apple502j Modified 2021-06-25T07:14:20
Description
The plugin allowed authenticated users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks as the image_class parameter of the browser-shot shortcode was not escaped.
PoC
Add the following shortcode in a page, then view the page (either published or as preview to trigger the XSS): [browser-shot url="https://example.com" image_class='" onload="alert(origin)']
{"id": "WPVDB-ID:9C538C51-AE58-461D-B93B-CC9DFEBF2BC0", "type": "wpvulndb", "bulletinFamily": "software", "title": "Browser Screenshots < 1.7.6 - Contributor+ Stored XSS", "description": "The plugin allowed authenticated users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks as the image_class parameter of the browser-shot shortcode was not escaped.\n\n### PoC\n\nAdd the following shortcode in a page, then view the page (either published or as preview to trigger the XSS): [browser-shot url=\"https://example.com\" image_class='\" onload=\"alert(origin)']\n", "published": "2021-06-21T00:00:00", "modified": "2021-06-25T07:14:20", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, "href": "https://wpscan.com/vulnerability/9c538c51-ae58-461d-b93b-cc9dfebf2bc0", "reporter": "apple502j", "references": [], "cvelist": ["CVE-2021-24439"], "immutableFields": [], "lastseen": "2021-09-14T23:34:44", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24439"]}, {"type": "wpexploit", "idList": ["WPEX-ID:9C538C51-AE58-461D-B93B-CC9DFEBF2BC0"]}], "rev": 4}, "score": {"value": 4.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24439"]}, {"type": "wpexploit", "idList": ["WPEX-ID:9C538C51-AE58-461D-B93B-CC9DFEBF2BC0"]}]}, "exploitation": null, "vulnersScore": 4.3}, "affectedSoftware": [{"version": "1.7.6", "operator": "lt", "name": "browser-shots"}], "exploit": "Add the following shortcode in a page, then view the page (either published or as preview to trigger the XSS): [browser-shot url=\"https://example.com\" image_class='\" onload=\"alert(origin)']", "sourceData": "", "generation": 0, "_state": {"dependencies": 1646133417}}
{"wpexploit": [{"lastseen": "2021-09-14T23:34:44", "description": "The plugin allowed authenticated users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks as the image_class parameter of the browser-shot shortcode was not escaped.\n", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.4, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 2.7}, "published": "2021-06-21T00:00:00", "type": "wpexploit", "title": "Browser Screenshots < 1.7.6 - Contributor+ Stored XSS", "bulletinFamily": "exploit", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24439"], "modified": "2021-06-25T07:14:20", "id": "WPEX-ID:9C538C51-AE58-461D-B93B-CC9DFEBF2BC0", "href": "", "sourceData": "Add the following shortcode in a page, then view the page (either published or as preview to trigger the XSS): [browser-shot url=\"https://example.com\" image_class='\" onload=\"alert(origin)']", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}], "patchstack": [{"lastseen": "2022-04-20T19:45:46", "description": "Stored Cross-Site Scripting (XSS) vulnerability discovered by apple502j in WordPress Browser Screenshots plugin (versions <= 1.7.5).\n\n## Solution\n\nUpdate the WordPress Browser Screenshots plugin to the latest available version (at least 1.7.6).", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-06-21T00:00:00", "type": "patchstack", "title": "WordPress Browser Screenshots plugin <= 1.7.5 - Stored Cross-Site Scripting (XSS) vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24439"], "modified": "2021-06-21T00:00:00", "id": "PATCHSTACK:A26EBD15134F498C383211FEAA74BC05", "href": "https://patchstack.com/database/vulnerability/browser-shots/wordpress-browser-screenshots-plugin-1-7-5-stored-cross-site-scripting-xss-vulnerability", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}], "cve": [{"lastseen": "2022-03-23T14:54:40", "description": "The Browser Screenshots WordPress plugin before 1.7.6 allowed authenticated users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks as the image_class parameter of the browser-shot shortcode was not escaped.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-07-12T20:15:00", "type": "cve", "title": "CVE-2021-24439", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24439"], "modified": "2021-07-15T15:27:00", "cpe": [], "id": "CVE-2021-24439", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24439", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": []}]}