Application Details
GiveWP is an online fundraising platform utilised to increase online donations, manage donors, and gain insight into the fundraising goals, all directly from within a WordPress website.
Vulnerability
GiveWP plugin WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the edit.php script.
Identification
A remote attacker could exploit this vulnerability using the 's' parameter in a specially crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
GET /wp-admin/edit.php?s="></script><script>alert('idappcomDEE')</script>&start-date&end-date&form_id=0&action=-1&paged=1&give_action=delete_bulk_donor&orderby=id&order=DESC&action2=-1&post_type=give_forms&page=give-donors&view=donors
Detection
By turning this into a traffic file and matching rule, we are able to detect attempts to influence the vulnerable parameter with cross-site scripting attempts.
Coverage
Idappcom has created signature 8010953 along with a traffic file.
References
WordPress GiveWP 2.9.7 XSS - Packet Storm Security
Traffic IQ
If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional
Comentarios