Lucene search

K
zdtCeylan BOZOĞULLARINDAN1337DAY-ID-37283
HistoryJan 27, 2022 - 12:00 a.m.

WordPress Mortgage Calculators WP 1.52 Plugin - Stored Cross-Site Scripting Vulnerability

2022-01-2700:00:00
Ceylan BOZOĞULLARINDAN
0day.today
170
wordpress
plugin
cross-site scripting
authenticated
vendor
calculator
sanitisation
javascript
payload
cve-2021-24904
vulnerability

EPSS

0.001

Percentile

38.3%

# Exploit Title: WordPress Plugin Mortgage Calculators WP 1.52 - Stored Cross-Site Scripting (XSS) (Authenticated)
# Exploit Author: Ceylan Bozogullarindan
# Vendor Homepage: https://lenderd.com/
# Software Link: https://mortgagecalculatorsplugin.com/
# Version: 1.52
# Tested on: Linux
# CVE : CVE-2021-24904 (https://wpscan.com/vulnerability/7b80f89b-e724-41c5-aa03-21d1eef50f21)


# Description:
The plugin gives users real-time estimates by providing mortgage calculators. It does not implement any sanitisation on the color value of the background of a calculator in admin panel, which could lead to authenticated Stored Cross-Site Scripting issues. An attacker can execute malicious javascript codes for all visitors of a page containing the calculator.


# Steps To Reproduce:
1. Go to settings page available under the "Calculator" menu item.
2. Click the "Select Color" button and type the following payload the input space: `hacked</style></head><script>alert(1)</script>`
3. Click the "Save Changes" button to save settings.
4. Create a new page and add the shortcode ([mcwp type="cv"]) of the calculator, for testing.
5. Visit the page to trigger XSS.