XSS in Blubrry PowerPress Podcasting wordpress plugin <= 6.0.4Sign up to our free email alerts service for instant vulnerability notifications!
Details ================ # Title : Cross Site Scripting (XSS) in Blubrry PowerPress Podcasting wordpress plugin Version 6.0.4 # Affected Product : Blubrry PowerPress Podcasting wordpress plugin # Vendor Homepage : https://wordpress.org/plugins/powerpress/developers/ # Vulnerability Type : Cross Site Scripting (XSS) # Risk : High # POC URL : https://github.com/cybersecurityworks/Disclosed/issues/7 # Video URL : https://www.youtube.com/watch?v=jWMQSJvxDNE # Status : Fixed Description ================ By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies. This means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains acces
|Proof of Concept||
Reproducing Steps: ================ Logon into any wordpress application (localhost or public host) Modifying the value of tab variable in Blubrry PowerPress Version 6.0.4 Fill all the variables with "></script><script>alert(document.cookie);</script> payload and send the request to the server. Now, the added XSS payload will be echoed back from the server without validating the input even after wp-config.php file has been configured with XSS filter settings.
fixed in version 6.0.5
|OWASP Top 10||A3: Cross-Site Scripting (XSS)|
|Publicly Published||2015-10-27 (almost 2 years ago)|
|Added||2016-02-07 (over 1 year ago)|
|Last Updated||2016-02-07 (over 1 year ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|