Vulnerabilities in the plugin
-
Hello WordPress Simple Survey developers!
Our security team from Quantika14 just found some vulnerabilities in your plugin (WordPress Simple Survey).
==============Vulnerabilities
The vulnerabilities found are usually called as “Cross Site Scripting”
(also known as “XSS”). A XSS means that some inputs filled by
the user (in this case admin or other role that can use the plugin) can
inject JavaScript code, and with this an attacker can steal cookies,
distribute malware or everyhing he wants.In your plugins every input provided by the user isn’t sanitized before
be introduced in the database, so if you do some old tricks like ‘
“><script src=YourVeryVeryDangerous.js></script> ‘ u can exploit it. As
far we searched in your sources, any $_POST variable was cleaned
properly.Even if the admin is the only avaible to use the plugin, he can be
tricked using some UI redressing attacks (like Clickjacking) in order to
inject the JavaScript code.============Fixes
– Cross Site Scripting
Fixing XSS is easy too in WordPress. You can sanitize the parameters filled by users through API functions, like esc_html. If you use esc_html
in all parameters before introduce it in the database or before do a “echo” the problem will be solved.IF you need some proof of concepts, or need more information about how to fix the vulnerabilities, please feel free to send us a e-mail
- The topic ‘Vulnerabilities in the plugin’ is closed to new replies.