关联漏洞
标题:
WordPress Plugin Popup Builder 安全漏洞
(CVE-2023-6000)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin Popup Builder 4.2.3 版本之前存在安全漏洞,该漏洞源于不会阻止简单访问者更新现有的弹出窗口,并在其中注入 JavaScript,这可能会导致存储型跨站脚本。
描述
This vulnerability displays an XSS flaw in a WordPress popup plugin, allowing attackers to inject malicious JavaScript through a stored XSS
介绍
# CVE-2023-6000-POC
This vulnerability allows an attacker to exploit a Cross-Site Scripting (XSS) flaw in the WordPress Popup Builder plugin.
The plugin fails to prevent regular visitors from modifying existing popups and by sending a specially crafted request to the server,
the attacker can inject malicious scripts into the popup, which will execute when users interact with the popup.
For this POC, the vulnerability will trigger by manipulating the popup’s opening behavior, where a simple alert script, will be injected to run when the popup opens.
This type of attack can lead to a range of issues, including unauthorized access to sensitive information and further exploitation of the affected website, potentially compromising user data or the entire site.
## Affected Versions
- Fixed Version : **Popup Builder 4.2.3**
- CVE-ID : **CVE-2023-6000**
- Type : **Stored XSS**
## Timeline
- 2023‑11‑07 – Details of the vulnerability sent to the Popup Builder team
- 2023‑11‑13 – Popup Builder 4.2.2 is released, but still vulnerable
- 2023‑11‑21 – We escalate the issue to WordPress.org’s Plugin team
- 2023‑12‑07 – Patch released by the Popup Builder team on version 4.2.3
文件快照
[4.0K] /data/pocs/60efb3f492101a8b512a70ddbd76d723cedfd8d7
├── [2.7K] Environment Setup.md
├── [3.7K] Exploit.md
└── [1.2K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。