what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Link Library 5.9.12.29 Cross Site Scripting

WordPress Link Library 5.9.12.29 Cross Site Scripting
Posted Aug 16, 2016
Authored by Securify B.V., Burak Kelebek

WordPress Link Library plugin version 5.9.12.29 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2e33996f60775e70ea4ebb78d472ee992b557cb5f8f855a3a6ac1a0c2fd005b1

WordPress Link Library 5.9.12.29 Cross Site Scripting

Change Mirror Download
------------------------------------------------------------------------
Cross-Site Scripting in Link Library WordPress Plugin
------------------------------------------------------------------------
Burak Kelebek, July 2016

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A Reflected Cross-Site Scripting (XSS) vulnerability has been found in
the Link Library plugin. By using this vulnerability an attacker can
inject malicious JavaScript code into the application, which will
execute within the browser of any logged-in admin.

------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160724-0016

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on Link Library version 5.9.12.29.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This issue is fixed in version 5.9.12.30

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_link_library_wordpress_plugin.html

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it. Reflected XSS occurs when user input is immediately returned by a web application in an error message, search result, or any other response that includes some or all of the input provided by the user as part of the request

"successimportcount" and "sucessupdatecount" fields do not validate <script> tags and do not perform output encoding.

/link-library/link-library-admin.php

885: echo echo "<div id='message' class='updated fade'><p><strong>" . ($_GET['successimportcount'] : '0') . " " . __('link(s) imported', 'link-library') . ", " . ($_GET['successupdatecount'] : '0') . " " . __('link(s) updated', 'link-library') . ".</strong></p></div>";

Proof of concept

http://<targetsite>/wp-admin/admin.php?page=link-library-settingssets&messages=9&successimportcount=1" /><script>alert(1)</script>&currenttab=importexport


------------------------------------------------------------------------
Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its
goal is to contribute to the security of popular, widely used OSS
projects in a fun and educational way.

Login or Register to add favorites

File Archive:

October 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    0 Files
  • 2
    Oct 2nd
    22 Files
  • 3
    Oct 3rd
    19 Files
  • 4
    Oct 4th
    16 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close