Vulnerabilities in the plugin
-
Hello Evaluate Plugin developers!
Our security team from Quantika14 just found some vulnerabilities in your plugin (Evaluate).
============Vulnerabilities
– Cross Site Scripting
Because any variable is sanitized properly when is managed by the plugin, you can inject malicious JavaScript code that can leads in a session hijack (stealing the cookie), phising, or any other bad scenario that the attacker can imagen (injecting JavaSript he have full control on victim browser). To do that, the attacker only need to send to the administrador a crafted web with an hidden iframe and an autosubmit form. Even if the attacker can not set the nonce parameter in the form, he does not need it: with the Ajax preview the javascript malicious code is executed automatically. In order to check it, you can try to fill the metric name with “><script>alert(document.cookie)</script> and check the result.
===========Fixes
To fix this vulnerability you only need to clean the parameters provided by the user, eliminating any non-alphanumeric character (except _ and -) or escaping it with any functions (for example changing < for < ).
IF you need some proof of concepts, or need more information about how to fix the vulnerabilities, please feel free to send us a e-mail.
- The topic ‘Vulnerabilities in the plugin’ is closed to new replies.