GD bbPress Attachments <= 2.5 - Authenticated Stored XSS



Description
An authenticated user of a bbPress forum, who can attach a file, can inject arbitrary JavaScript code via the image filename. The arbitrary code runs both on the topic page and in the admin panel, and it only affects the administrators, moderators and the attacker.

The variable $error[‘file’] in /code/attachments/front.php (line 349) is not escaped.

Affects Plugin

fixed in version 2.6

References

URL https://www.gubello.me/blog/gd-bbpress-attachments-2-5-authenticated-stored-xss/
URL https://www.youtube.com/watch?v=n4xX0ODV1O4
URL https://www.dev4press.com/blog/plugins/2018/gd-bbpress-attachments-2-6/
URL https://plugins.trac.wordpress.org/changeset/1865293/gd-bbpress-attachments

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter Luigi
Submitter Website https://www.gubello.me/blog/
Views 123
Verified No
WPVDB ID 9082

Timeline

Publicly Published 2018-05-14 (4 months ago)
Added 2018-05-14 (4 months ago)
Last Updated 2018-05-14 (4 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.