A Reflected XSS Vulnerability in wordpres plugin"raygun4wp 1.8.0.0"

Description:
A Reflected XSS Vulnerability in wordpress plugin"raygun4wp 1.8.0.0"

Status:
Fixed From version 1.8.1

Details:
This vulnerability exist in the file "raygun4wp/ sendtesterror.php", the critical code as follow screen snapshot:













>> line 50 means that the variable $previousUrl is from browser side, so it can be controlled by user.

>>line 54 means that web server side has no checking on $previousUrl before writing it to the response html, so if $previousUrl contains javascript code, the code will be executed on the browser side.

So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil.
http://localhost/wordpress/wp-content/plugins/raygun4wp/sendtesterror.php?backurl="/><script>alert("hacked");</script>


















Reference:
https://github.com/MindscapeHQ/raygun4wordpress/issues/16


Credit:
This bugs was discovered by ADLab of VenusTech.

评论

  1. com/wp-content/uploads/2021/06/Screen-Shot-2021-06-18-at-11.02.53-AM-e1624028870629.png" alt="" width="1166" height="1176" srcset="https://www. You must heat up the formula with an additional component, whether a heating pad, electronic heating device, or a hand-operated heating unit. Most of our reviewed products also included a temperature heating pad and/or thermometer testing part to make sure the sample is heated correctly before sending it to the lab. Visit: https://www.urineworld.com/

    回复删除

发表评论

此博客中的热门博文

A stored xss vulnerability in "/account/details.php" of WebsiteBaker 2.10.0